Hiding the Access Pattern is Not Enough: Exploiting Search Pattern
  Leakage in Searchable Encryption

Hiding the Access Pattern is Not Enough: Exploiting Search Pattern Leakage in Searchable Encryption

Papers citing "Hiding the Access Pattern is Not Enough: Exploiting Search Pattern Leakage in Searchable Encryption"

14 / 14 papers shown
Title

We use cookies and other tracking technologies to improve your browsing experience on our website, to show you personalized content and targeted ads, to analyze our website traffic, and to understand where our visitors are coming from. See our policy.