Login / Signup
Practical Volume-Based Attacks on Encrypted Databases.
Stephanie Wang
Rishabh Poddar
Jianan Lu
Raluca Ada Popa
Published in:
IACR Cryptol. ePrint Arch. (2019)
Keyphrases
</>
databases
relational databases
database
knowledge discovery
neural network
data management
countermeasures
real world
data model
database applications
watermarking scheme
malicious users
data sets
database systems
security risks
stepping stones