{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T16:32:21Z","timestamp":1770222741056,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,10,24]],"date-time":"2016-10-24T00:00:00Z","timestamp":1477267200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,10,24]]},"DOI":"10.1145\/2976749.2978401","type":"proceedings-article","created":{"date-parts":[[2016,10,25]],"date-time":"2016-10-25T12:46:35Z","timestamp":1477399595000},"page":"1341-1352","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":76,"title":["The Shadow Nemesis"],"prefix":"10.1145","author":[{"given":"David","family":"Pouliot","sequence":"first","affiliation":[{"name":"Portland State University, Portland, OR, USA"}]},{"given":"Charles V.","family":"Wright","sequence":"additional","affiliation":[{"name":"Portland State University, Portland, OR, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,10,24]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"International Journal of Computer Science and Security (IJCSS), 5(3):298","author":"AbuTaha M.","year":"2011","unstructured":"M. AbuTaha , M. Farajallah , R. Tahboub , and M. Odeh . Survey paper: cryptography is the science of information security . International Journal of Computer Science and Security (IJCSS), 5(3):298 , 2011 . M. AbuTaha, M. Farajallah, R. Tahboub, and M. Odeh. Survey paper: cryptography is the science of information security. International Journal of Computer Science and Security (IJCSS), 5(3):298, 2011."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.211474"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/1770560.1770563"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"M.\n      Bellare A.\n      Boldyreva and \n      A.\n      O'Neill\n    .\n  Deterministic and efficiently searchable encryption\n  . In A. Menezes editor CRYPTO \n  2007 volume \n  4622\n   of \n  LNCS pages \n  535\n  --\n  552\n  . \n  Springer Heidelberg Aug. 2007.   M. Bellare A. Boldyreva and A. O'Neill. Deterministic and efficiently searchable encryption. In A. Menezes editor CRYPTO 2007 volume 4622 of LNCS pages 535--552. Springer Heidelberg Aug. 2007.","DOI":"10.1007\/978-3-540-74143-5_30"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/944919.944937"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/11767831_12"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1080\/15427951.2004.10129096"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813700"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23264"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218001404003228"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180417"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.31"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/800070.802212"},{"key":"e_1_3_2_1_16_1","volume-title":"Real World Crypto","author":"Grubbs P.","year":"2016","unstructured":"P. Grubbs . On deploying property-preserving encryption . Presented at Real World Crypto , January 2016 . P. Grubbs. On deploying property-preserving encryption. Presented at Real World Crypto, January 2016."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660326"},{"key":"e_1_3_2_1_18_1","volume-title":"NDSS 2012","author":"Islam M. S.","year":"2012","unstructured":"M. S. Islam , M. Kuzu , and M. Kantarcioglu . Access pattern disclosure on searchable encryption: Ramification, attack and mitigation . In NDSS 2012 . The Internet Society , Feb. 2012 . M. S. Islam, M. Kuzu, and M. Kantarcioglu. Access pattern disclosure on searchable encryption: Ramification, attack and mitigation. In NDSS 2012. The Internet Society, Feb. 2012."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382298"},{"key":"e_1_3_2_1_20_1","first-page":"217","volume-title":"Machine learning: ECML","author":"Klimt B.","year":"2004","unstructured":"B. Klimt and Y. Yang . The enron corpus: A new dataset for email classification research . In Machine learning: ECML 2004 , pages 217 -- 226 . Springer , 2004. B. Klimt and Y. Yang. The enron corpus: A new dataset for email classification research. In Machine learning: ECML 2004, pages 217--226. Springer, 2004."},{"key":"e_1_3_2_1_22_1","first-page":"33","volume-title":"23rd USENIX Security Symposium (USENIX Security 14)","author":"Lau B.","year":"2014","unstructured":"B. Lau , S. Chung , C. Song , Y. Jang , W. Lee , and A. Boldyreva . Mimesis aegis: A mimicry privacy shield-a system's approach to data privacy on public cloud . In 23rd USENIX Security Symposium (USENIX Security 14) , pages 33 -- 48 , San Diego, CA , Aug. 2014 . USENIX Association. B. Lau, S. Chung, C. Song, Y. Jang, W. Lee, and A. Boldyreva. Mimesis aegis: A mimicry privacy shield-a system's approach to data privacy on public cloud. In 23rd USENIX Security Symposium (USENIX Security 14), pages 33--48, San Diego, CA, Aug. 2014. USENIX Association."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813651"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.30"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076744"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655025"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-43936-4_20"},{"key":"e_1_3_2_1_28_1","first-page":"44","volume-title":"2000 IEEE Symposium on Security and Privacy","author":"Song D. X.","year":"2000","unstructured":"D. X. Song , D. Wagner , and A. Perrig . Practical techniques for searches on encrypted data . In 2000 IEEE Symposium on Security and Privacy , pages 44 -- 55 . IEEE Computer Society Press , May 2000 . D. X. Song, D. Wagner, and A. Perrig. Practical techniques for searches on encrypted data. In 2000 IEEE Symposium on Security and Privacy, pages 44--55. IEEE Computer Society Press, May 2000."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.6778"},{"key":"e_1_3_2_1_30_1","volume-title":"AAAI Spring Symposium: Analyzing Microtext","author":"Uthus D. C.","year":"2013","unstructured":"D. C. Uthus and D. W. Aha . The ubuntu chat corpus for multiparticipant chat analysis . In AAAI Spring Symposium: Analyzing Microtext , 2013 . D. C. Uthus and D. W. Aha. The ubuntu chat corpus for multiparticipant chat analysis. In AAAI Spring Symposium: Analyzing Microtext, 2013."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/238386.238530"},{"key":"e_1_3_2_1_32_1","volume-title":"Morgan Kaufmann","author":"Witten I. H.","year":"1999","unstructured":"I. H. Witten , A. Moffat , and T. C. Bell . Managing gigabytes: compressing and indexing documents and images . Morgan Kaufmann , 1999 . I. H. Witten, A. Moffat, and T. C. Bell. Managing gigabytes: compressing and indexing documents and images. Morgan Kaufmann, 1999."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2008.245"}],"event":{"name":"CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security","location":"Vienna Austria","acronym":"CCS'16","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978401","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2976749.2978401","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:40:15Z","timestamp":1750218015000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978401"}},"subtitle":["Inference Attacks on Efficiently Deployable, Efficiently Searchable Encryption"],"short-title":[],"issued":{"date-parts":[[2016,10,24]]},"references-count":31,"alternative-id":["10.1145\/2976749.2978401","10.1145\/2976749"],"URL":"https:\/\/doi.org\/10.1145\/2976749.2978401","relation":{},"subject":[],"published":{"date-parts":[[2016,10,24]]},"assertion":[{"value":"2016-10-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}