Back to Results
First PageMeta Content
Cryptography / End-to-end encryption / Computing / Cloud storage / Cloud computing / Online backup services / Cloud computing security / Centralized computing / Deterministic encryption


Leakage-Abuse Attacks against Searchable Encryption David Cash Paul Grubbs
Add to Reading List

Document Date: 2015-10-27 14:52:24


Open Document

File Size: 1,39 MB

Share Result on Facebook