Cited By
View all- Yang JKim K(2024)Exploring the Security Vulnerability in Frequency-Hiding Order-Preserving EncryptionSecurity and Communication Networks10.1155/2024/27643452024Online publication date: 29-Feb-2024
- Markatou ETamassia RLuo BLiao XXu JKirda ELie D(2024)Reconstructing with Even Less: Amplifying Leakage and Drawing GraphsProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3670313(4777-4791)Online publication date: 2-Dec-2024
- Gui ZPaterson KTang TCalandrino JTroncoso C(2023)Security analysis of MongoDB queryable encryptionProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620654(7445-7462)Online publication date: 9-Aug-2023
- Show More Cited By