Publisher
Springer International Publishing
Reference34 articles.
1. Blackstone L, Kamara S, Moataz T (2020) Revisiting leakage abuse attacks. In: 27th Annual Network and Distributed System Security Symposium, NDSS 2020, San Diego, California, USA, February 23–26, 2020, The Internet Society
2. Bogatov D, Kollios G, Reyzin L (2019) A comparative evaluation of order-revealing encryption schemes and secure range-query protocols. Proceedings of the International Conference on Very Large Databases 12(8):933–947
3. Bost R, Minaud B, Ohrimenko O (2017) Forward and backward private searchable encryption from constrained cryptographic primitives. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30–November 03, 2017, ACM, pp 1465–1482
4. Broder AZ, Mitzenmacher M (2003) Survey: Network applications of bloom filters: A survey. Internet Mathematics 1(4):485–509
5. Cash D, Grubbs P, Perry J, Ristenpart T (2016) Leakage-abuse attacks against searchable encryption. IACR Cryptology ePrint Archive p 718