Article,

Hiding the Access Pattern is Not Enough: Exploiting Search Pattern Leakage in Searchable Encryption.

, and .
CoRR, (2020)

Meta data

Tags

Users

  • @dblp

Comments and Reviews