共 23 条
[1]
[Anonymous], NDSS 2014
[2]
Asghar M.R., 2013, P ACM WORKSHOP CLOUD, P77, DOI DOI 10.1145/2517488.2517492
[3]
Bing Wang, 2015, 2015 IEEE Conference on Computer Communications (INFOCOM). Proceedings, P2092, DOI 10.1109/INFOCOM.2015.7218594
[4]
Bost R., 2016, P 2016 ACM SIGSAC C, P1143
[6]
Leakage-Abuse Attacks Against Searchable Encryption
[J].
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2015,
:668-679
[7]
Chang YC, 2005, LECT NOTES COMPUT SC, V3531, P442
[8]
Cui S., 2017, ACISP 2017
[9]
Cui S., 2017, P MCDB PRIVACY PRESE
[10]
Curtmola Reza, 2006, P 13 ACM C COMP COMM, DOI DOI 10.1145/1180405.1180417