@dblp

Leakage-Abuse Attacks Against Searchable Encryption.

, , , and . ACM Conference on Computer and Communications Security, page 668-679. ACM, (2015)

Links and resources

Tags