Evaluating Leakage Attacks Against Relational Encrypted Search

Download paper here