Cited By
View all- Zheng LXu LWang CWang SHu YQin ZLi FRen K(2024)SWAT: A System-Wide Approach to Tunable Leakage Mitigation in Encrypted Data StoresProceedings of the VLDB Endowment10.14778/3675034.367503817:10(2445-2458)Online publication date: 1-Jun-2024
- Kumari KMehrotra SSharma S(2024)Tutorial: Information Leakage from Cryptographic Techniques2024 IEEE 44th International Conference on Distributed Computing Systems Workshops (ICDCSW)10.1109/ICDCSW63686.2024.00007(9-12)Online publication date: 23-Jul-2024
- Boldyreva ATang T(2024)Encrypted Multi-map that Hides Query, Access, and Volume PatternsSecurity and Cryptography for Networks10.1007/978-3-031-71070-4_11(230-251)Online publication date: 10-Sep-2024