Login / Signup
Interpreting and Mitigating Leakage-Abuse Attacks in Searchable Symmetric Encryption.
Lei Xu
Huayi Duan
Anxin Zhou
Xingliang Yuan
Cong Wang
Published in:
IEEE Trans. Inf. Forensics Secur. (2021)
Keyphrases
</>
information leakage
countermeasures
malicious attacks
digital libraries
traffic analysis
cryptographic protocols
database systems
risk management
security mechanisms
computer security
security risks
security vulnerabilities
database
neural network
watermarking algorithm
secure routing