1. Inference and record-injection attacks on searchable encrypted relational databases;Abdelraheem;IACR Cryptol. ePrint Arch,2017
2. Leakage-Abuse Attacks Against Searchable Encryption
3. Practical Passive Leakage-abuse Attacks Against Symmetric Searchable Encryption
4. Breaking Web Applications Built On Top of Encrypted Data
5. Access pattern disclosure on searchable encryption: Ramification, attack and mitigation;Islam