Evaluating Leakage Attacks Against Relational Encrypted Search

Published:

Download paper here