Login / Signup
Hiding the Access Pattern is Not Enough: Exploiting Search Pattern Leakage in Searchable Encryption.
Simon Oya
Florian Kerschbaum
Published in:
USENIX Security Symposium (2021)
Keyphrases
</>
access patterns
digital libraries
query processing
co occurrence
keyword search
search queries