Research Article

Revisiting the Practicality of Search on Encrypted Data: From the Security Broker’s Perspective

Figure 5

Architecture of the Enc-YUN.