Leakage-abuse attacks against searchable encryption, p.668679, 2015. ,
Inference attacks on property-preserving encrypted databases, p.644655, 2015. ,
Practical techniques for searches on encrypted data, S&P 2000, p.4455, 2000. ,
Access pattern disclosure on searchable encryption: Ramication, attack and mitigation, NDSS 2012, 2012. ,
Ecient computation on oblivious rams, STOC 1990, p.514523, 1990. ,
Software protection and simulation on oblivious rams, J. ACM, vol.43, issue.3, p.431473, 1996. ,
Path ORAM: an extremely simple oblivious RAM protocol, p.299310, 2013. ,
Private information retrieval, J. ACM, vol.45, issue.6, p.965981, 1998. ,
, NDSS 2008. The Internet Society, 2008.
Supporting complex queries and access policies for multi-user encrypted databases, p.7788, 2013. ,
Practical dynamic searchable encryption with small leakage, NDSS 2013, vol.71, p.7275, 2014. ,
Private large-scale databases with distributed searchable symmetric encryption, CT-RSA 2016, ser. Lecture Notes in Computer Science, K. Sako, vol.9610, p.90107, 2016. ,
Secure and practical searchable encryption: A position paper, ser. Lecture Notes in Computer Science, 2017. ,
Searchable symmetric encryption: improved denitions and ecient constructions, CCS 2006, A. Juels, p.7988, 2006. ,
Parallel and dynamic searchable symmetric encryption, in FC 2013, ser. Lecture Notes in Computer Science, vol.7859, p.258274, 2013. ,
Implementing deletion in B+-trees, SIGMOD Rec, p.3338, 1995. ,