Login / Signup
Hiding the Access Pattern is Not Enough: Exploiting Search Pattern Leakage in Searchable Encryption.
Simon Oya
Florian Kerschbaum
Published in:
CoRR (2020)
Keyphrases
</>
access patterns
digital libraries
search queries
web users
keyword search
prefetching
web usage mining