1. Mohamed Ahmed Abdelraheem Tobias Andersson and Christian Gehrmann. 2017. Inference and record-injection attacks on searchable encrypted relational databases. IACR Cryptol. ePrint Arch. (2017) 24. Mohamed Ahmed Abdelraheem Tobias Andersson and Christian Gehrmann. 2017. Inference and record-injection attacks on searchable encrypted relational databases. IACR Cryptol. ePrint Arch. (2017) 24.
2. Mohamed Ahmed Abdelraheem , Tobias Andersson , and Christian Gehrmann . 2017. Searchable encrypted relational databases: Risks and countermeasures . In Data Privacy Management, Cryptocurrencies and Blockchain Technology . Springer , 70--85. Mohamed Ahmed Abdelraheem, Tobias Andersson, and Christian Gehrmann. 2017. Searchable encrypted relational databases: Risks and countermeasures. In Data Privacy Management, Cryptocurrencies and Blockchain Technology. Springer, 70--85.
3. Forward and backward private searchable encryption with SGX. In EuroSec 2019;Amjad Ghous;ACM,2019
4. Arvind Arasu Spyros Blanas Ken Eguro Raghav Kaushik Donald Kossmann Ravishankar Ramamurthy and Ramarathnam Venkatesan. 2013. Orthogonal security with cipherbase. In CIDR. Arvind Arasu Spyros Blanas Ken Eguro Raghav Kaushik Donald Kossmann Ravishankar Ramamurthy and Ramarathnam Venkatesan. 2013. Orthogonal security with cipherbase. In CIDR.
5. Muhammad Rizwan Asghar Mihaela Ion Giovanni Russello and Bruno Crispo. 2013. : Enforcing security policies in outsourced environments. Comput. Secur. (2013) 2--24. Muhammad Rizwan Asghar Mihaela Ion Giovanni Russello and Bruno Crispo. 2013. : Enforcing security policies in outsourced environments. Comput. Secur. (2013) 2--24.