Hiding the Access Pattern is Not Enough: Exploiting Search Pattern
  Leakage in Searchable Encryption

Hiding the Access Pattern is Not Enough: Exploiting Search Pattern Leakage in Searchable Encryption

Papers citing "Hiding the Access Pattern is Not Enough: Exploiting Search Pattern Leakage in Searchable Encryption"