Login / Signup
File-Injection Attacks on Searchable Encryption, Based on Binomial Structures.
Tjard Langhout
Huanhuan Chen
Kaitai Liang
Published in:
IACR Cryptol. ePrint Arch. (2024)
Keyphrases
</>
injection attacks
database
collaborative recommender systems
end users
data mining techniques
file system
encryption scheme