Login / Signup
Revisiting Leakage Abuse Attacks.
Laura Blackstone
Seny Kamara
Tarik Moataz
Published in:
IACR Cryptol. ePrint Arch. (2019)
Keyphrases
</>
information leakage
countermeasures
malicious attacks
traffic analysis
attack detection
malicious users
neural network
data publishing
security flaws
database
search engine
information systems
website
security mechanisms
chosen plaintext