Sign in

Update Recovery Attacks on Encrypted Database Within Two Updates Using Range Queries Leakage.

Jianting NingGeong Sen PohXinyi HuangRobert H. DengShuwei CaoEe-Chien Chang
Published in: IEEE Trans. Dependable Secur. Comput. (2022)
Keyphrases