Research Article

Revisiting the Practicality of Search on Encrypted Data: From the Security Broker’s Perspective

Figure 4

SSL/TLS interception in Enc-YUN.