Login / Signup
Interpreting and Mitigating Leakage-abuse Attacks in Searchable Symmetric Encryption.
Lei Xu
Huayi Duan
Anxin Zhou
Xingliang Yuan
Cong Wang
Published in:
IACR Cryptol. ePrint Arch. (2021)
Keyphrases
</>
information leakage
countermeasures
database
digital libraries
risk management
data sets
denial of service attacks
data mining
security mechanisms
computer security
security protocols
image watermarking
traffic analysis
data publishing
attack detection
chosen plaintext