Return to Article Details Retrieving Data from Encrypted file by using Cosine Similarity Download Download PDF