共 46 条
[2]
Ambati V., 2011, HUMAN COMPUTATION, P1
[3]
[Anonymous], 2013, LNCS, DOI [DOI 10.1007/978-3-642-38631-2_34, 10.1007/978-3-642-38631-2_34]
[4]
[Anonymous], 2006, Wired magazine, DOI DOI 10.1086/599595
[5]
[Anonymous], 2013, P ACM SIGSAC C COMP, DOI 10.1145/2508859.2516730
[6]
Bao F, 2008, LECT NOTES COMPUT SC, V4991, P71
[7]
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[9]
Leakage-Abuse Attacks Against Searchable Encryption
[J].
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2015,
:668-679