[1]
P. Chaudhari, J.-J. Chin, and S. M. Mohamad, “An In-Depth Analysis on Efficiency and Vulnerabilities on a Cloud-Based Searchable Symmetric Encryption Solution”, JIWE, vol. 3, no. 1, pp. 277–295, Feb. 2024.