共 77 条
[51]
Kiayias A., 2013, P 2013 ACM SIGSAC C, P669
[52]
Kornaropoulos Evgenios M., 2022, CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, P1829, DOI 10.1145/3548606.3560593
[53]
The State of the Uniform: Attacks on Encrypted Databases Beyond the Uniform Query Distribution
[J].
2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020),
2020,
:1223-1240
[54]
Kornaropoulos Evgenios M., 2021, PROC IEEE S SECURITY
[55]
The Case for Learned Index Structures
[J].
SIGMOD'18: PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA,
2018,
:489-504
[56]
Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage
[J].
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2018,
:297-314
[57]
Order-Revealing Encryption: New Constructions, Applications, and Lower Bounds
[J].
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2016,
:1167-1178
[58]
Li FF, 2005, LECT NOTES COMPUT SC, V3633, P273
[59]
Malte Spitz, 2011, CRAWDAD DAT SPITZ CE