Thwarting Leakage Abuse Attacks against Searchable Encryption - A Formal Approach and Applications to Database Padding.

IACR Cryptology ePrint Archive(2017)

引用 25|浏览2
暂无评分
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要