Side channels in deduplication: trade-offs between leakage and efficiency. Article Swipe
YOU?
·
· 2016
· Open Access
·
Deduplication removes redundant copies of files or data blocks stored on the cloud. Clientside deduplication, where the client only uploads the file upon the request of the server, provides major storage and bandwidth savings, but introduces a number of security concerns. Harnik et al. (2010) showed how cross-user client-side deduplication inherently gives the adversary access to a (noisy) side-channel that may divulge whether or not a particular file is stored on the server, leading to leakage of user information. We provide formal definitions for deduplication strategies and their security in terms of adversarial advantage. Using these definitions, we provide a criterion for designing good strategies and then prove a bound characterizing the necessary trade-off between security and efficiency.
Related Topics
- Type
- preprint
- Language
- en
- Landing Page
- http://hdl.handle.net/11250/2488888
- http://hdl.handle.net/11250/2488888
- OA Status
- gold
- Cited By
- 1
- Related Works
- 20
- OpenAlex ID
- https://openalex.org/W2949501351
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W2949501351Canonical identifier for this work in OpenAlex
- Title
-
Side channels in deduplication: trade-offs between leakage and efficiency.Work title
- Type
-
preprintOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2016Year of publication
- Publication date
-
2016-01-01Full publication date if available
- Authors
-
Frederik Armknecht, Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Mohsen TooraniList of authors in order
- Landing page
-
https://hdl.handle.net/11250/2488888Publisher landing page
- PDF URL
-
https://hdl.handle.net/11250/2488888Direct link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
goldOpen access status per OpenAlex
- OA URL
-
https://hdl.handle.net/11250/2488888Direct OA link when available
- Concepts
-
Data deduplication, Computer science, Upload, Client-side, Information leakage, Adversary, Shuffling, Cloud computing, Computer security, Cloud storage, Computer network, Database, Operating system, Programming languageTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
1Total citation count in OpenAlex
- Citations by year (recent)
-
2021: 1Per-year citation counts (last 5 years)
- Related works (count)
-
20Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W2949501351 |
|---|---|
| doi | |
| ids.mag | 2949501351 |
| ids.openalex | https://openalex.org/W2949501351 |
| fwci | |
| type | preprint |
| title | Side channels in deduplication: trade-offs between leakage and efficiency. |
| biblio.issue | |
| biblio.volume | 2016 |
| biblio.last_page | |
| biblio.first_page | 977 |
| topics[0].id | https://openalex.org/T11614 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9986000061035156 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1710 |
| topics[0].subfield.display_name | Information Systems |
| topics[0].display_name | Cloud Data Security Solutions |
| topics[1].id | https://openalex.org/T11424 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.955299973487854 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1702 |
| topics[1].subfield.display_name | Artificial Intelligence |
| topics[1].display_name | Security and Verification in Computing |
| topics[2].id | https://openalex.org/T10237 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9516000151634216 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1702 |
| topics[2].subfield.display_name | Artificial Intelligence |
| topics[2].display_name | Cryptography and Data Security |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C32587265 |
| concepts[0].level | 2 |
| concepts[0].score | 0.9663480520248413 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q1182260 |
| concepts[0].display_name | Data deduplication |
| concepts[1].id | https://openalex.org/C41008148 |
| concepts[1].level | 0 |
| concepts[1].score | 0.8251841068267822 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[1].display_name | Computer science |
| concepts[2].id | https://openalex.org/C71901391 |
| concepts[2].level | 2 |
| concepts[2].score | 0.6919158697128296 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q7126699 |
| concepts[2].display_name | Upload |
| concepts[3].id | https://openalex.org/C202477664 |
| concepts[3].level | 2 |
| concepts[3].score | 0.5884332656860352 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q1352449 |
| concepts[3].display_name | Client-side |
| concepts[4].id | https://openalex.org/C2779201187 |
| concepts[4].level | 2 |
| concepts[4].score | 0.5350156426429749 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q2775060 |
| concepts[4].display_name | Information leakage |
| concepts[5].id | https://openalex.org/C41065033 |
| concepts[5].level | 2 |
| concepts[5].score | 0.5247918963432312 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q2825412 |
| concepts[5].display_name | Adversary |
| concepts[6].id | https://openalex.org/C167927819 |
| concepts[6].level | 2 |
| concepts[6].score | 0.49267274141311646 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q1930567 |
| concepts[6].display_name | Shuffling |
| concepts[7].id | https://openalex.org/C79974875 |
| concepts[7].level | 2 |
| concepts[7].score | 0.4823302924633026 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q483639 |
| concepts[7].display_name | Cloud computing |
| concepts[8].id | https://openalex.org/C38652104 |
| concepts[8].level | 1 |
| concepts[8].score | 0.4663592576980591 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[8].display_name | Computer security |
| concepts[9].id | https://openalex.org/C2777059624 |
| concepts[9].level | 3 |
| concepts[9].score | 0.46161919832229614 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q914359 |
| concepts[9].display_name | Cloud storage |
| concepts[10].id | https://openalex.org/C31258907 |
| concepts[10].level | 1 |
| concepts[10].score | 0.40967971086502075 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q1301371 |
| concepts[10].display_name | Computer network |
| concepts[11].id | https://openalex.org/C77088390 |
| concepts[11].level | 1 |
| concepts[11].score | 0.3955901563167572 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q8513 |
| concepts[11].display_name | Database |
| concepts[12].id | https://openalex.org/C111919701 |
| concepts[12].level | 1 |
| concepts[12].score | 0.3059431314468384 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q9135 |
| concepts[12].display_name | Operating system |
| concepts[13].id | https://openalex.org/C199360897 |
| concepts[13].level | 1 |
| concepts[13].score | 0.0 |
| concepts[13].wikidata | https://www.wikidata.org/wiki/Q9143 |
| concepts[13].display_name | Programming language |
| keywords[0].id | https://openalex.org/keywords/data-deduplication |
| keywords[0].score | 0.9663480520248413 |
| keywords[0].display_name | Data deduplication |
| keywords[1].id | https://openalex.org/keywords/computer-science |
| keywords[1].score | 0.8251841068267822 |
| keywords[1].display_name | Computer science |
| keywords[2].id | https://openalex.org/keywords/upload |
| keywords[2].score | 0.6919158697128296 |
| keywords[2].display_name | Upload |
| keywords[3].id | https://openalex.org/keywords/client-side |
| keywords[3].score | 0.5884332656860352 |
| keywords[3].display_name | Client-side |
| keywords[4].id | https://openalex.org/keywords/information-leakage |
| keywords[4].score | 0.5350156426429749 |
| keywords[4].display_name | Information leakage |
| keywords[5].id | https://openalex.org/keywords/adversary |
| keywords[5].score | 0.5247918963432312 |
| keywords[5].display_name | Adversary |
| keywords[6].id | https://openalex.org/keywords/shuffling |
| keywords[6].score | 0.49267274141311646 |
| keywords[6].display_name | Shuffling |
| keywords[7].id | https://openalex.org/keywords/cloud-computing |
| keywords[7].score | 0.4823302924633026 |
| keywords[7].display_name | Cloud computing |
| keywords[8].id | https://openalex.org/keywords/computer-security |
| keywords[8].score | 0.4663592576980591 |
| keywords[8].display_name | Computer security |
| keywords[9].id | https://openalex.org/keywords/cloud-storage |
| keywords[9].score | 0.46161919832229614 |
| keywords[9].display_name | Cloud storage |
| keywords[10].id | https://openalex.org/keywords/computer-network |
| keywords[10].score | 0.40967971086502075 |
| keywords[10].display_name | Computer network |
| keywords[11].id | https://openalex.org/keywords/database |
| keywords[11].score | 0.3955901563167572 |
| keywords[11].display_name | Database |
| keywords[12].id | https://openalex.org/keywords/operating-system |
| keywords[12].score | 0.3059431314468384 |
| keywords[12].display_name | Operating system |
| language | en |
| locations[0].id | pmh:oai:ntnuopen.ntnu.no:11250/2488888 |
| locations[0].is_oa | True |
| locations[0].source | |
| locations[0].license | other-oa |
| locations[0].pdf_url | http://hdl.handle.net/11250/2488888 |
| locations[0].version | submittedVersion |
| locations[0].raw_type | info:eu-repo/semantics/bookPart |
| locations[0].license_id | https://openalex.org/licenses/other-oa |
| locations[0].is_accepted | False |
| locations[0].is_published | False |
| locations[0].raw_source_name | 266-274 |
| locations[0].landing_page_url | http://hdl.handle.net/11250/2488888 |
| locations[1].id | pmh:oai:ub-madoc.bib.uni-mannheim.de:59351 |
| locations[1].is_oa | True |
| locations[1].source.id | https://openalex.org/S4377196315 |
| locations[1].source.issn | |
| locations[1].source.type | repository |
| locations[1].source.is_oa | False |
| locations[1].source.issn_l | |
| locations[1].source.is_core | False |
| locations[1].source.is_in_doaj | False |
| locations[1].source.display_name | MADOC (University of Mannheim) |
| locations[1].source.host_organization | https://openalex.org/I177802217 |
| locations[1].source.host_organization_name | University of Mannheim |
| locations[1].source.host_organization_lineage | https://openalex.org/I177802217 |
| locations[1].license | |
| locations[1].pdf_url | https://eprint.iacr.org/2016/977 |
| locations[1].version | submittedVersion |
| locations[1].raw_type | Zeitschriftenartikel |
| locations[1].license_id | |
| locations[1].is_accepted | False |
| locations[1].is_published | False |
| locations[1].raw_source_name | |
| locations[1].landing_page_url | |
| locations[2].id | mag:2949501351 |
| locations[2].is_oa | False |
| locations[2].source.id | https://openalex.org/S2764847869 |
| locations[2].source.issn | |
| locations[2].source.type | repository |
| locations[2].source.is_oa | False |
| locations[2].source.issn_l | |
| locations[2].source.is_core | False |
| locations[2].source.is_in_doaj | False |
| locations[2].source.display_name | IACR Cryptology ePrint Archive |
| locations[2].source.host_organization | |
| locations[2].source.host_organization_name | |
| locations[2].source.host_organization_lineage | https://openalex.org/P4322614454 |
| locations[2].source.host_organization_lineage_names | Cryptology ePrint Archive |
| locations[2].license | |
| locations[2].pdf_url | |
| locations[2].version | submittedVersion |
| locations[2].raw_type | |
| locations[2].license_id | |
| locations[2].is_accepted | False |
| locations[2].is_published | False |
| locations[2].raw_source_name | IACR Cryptology ePrint Archive |
| locations[2].landing_page_url | https://eprint.iacr.org/2016/977.pdf |
| authorships[0].author.id | https://openalex.org/A5032638181 |
| authorships[0].author.orcid | https://orcid.org/0009-0003-9935-8095 |
| authorships[0].author.display_name | Frederik Armknecht |
| authorships[0].countries | DE |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I177802217 |
| authorships[0].affiliations[0].raw_affiliation_string | Univ. of Mannheim, Mannheim, Germany#TAB# |
| authorships[0].institutions[0].id | https://openalex.org/I177802217 |
| authorships[0].institutions[0].ror | https://ror.org/031bsb921 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I177802217 |
| authorships[0].institutions[0].country_code | DE |
| authorships[0].institutions[0].display_name | University of Mannheim |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Frederik Armknecht |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | Univ. of Mannheim, Mannheim, Germany#TAB# |
| authorships[1].author.id | https://openalex.org/A5091630171 |
| authorships[1].author.orcid | |
| authorships[1].author.display_name | Colin Boyd |
| authorships[1].countries | NO |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I204778367 |
| authorships[1].affiliations[0].raw_affiliation_string | Norwegian University of Science and Technology Trondheim, Norway#TAB# |
| authorships[1].institutions[0].id | https://openalex.org/I204778367 |
| authorships[1].institutions[0].ror | https://ror.org/05xg72x27 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I204778367 |
| authorships[1].institutions[0].country_code | NO |
| authorships[1].institutions[0].display_name | Norwegian University of Science and Technology |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Colin Boyd |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | Norwegian University of Science and Technology Trondheim, Norway#TAB# |
| authorships[2].author.id | https://openalex.org/A5050682503 |
| authorships[2].author.orcid | https://orcid.org/0000-0002-5935-5725 |
| authorships[2].author.display_name | Gareth T. Davies |
| authorships[2].countries | NO |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I204778367 |
| authorships[2].affiliations[0].raw_affiliation_string | Norwegian University of Science and Technology Trondheim, Norway#TAB# |
| authorships[2].institutions[0].id | https://openalex.org/I204778367 |
| authorships[2].institutions[0].ror | https://ror.org/05xg72x27 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I204778367 |
| authorships[2].institutions[0].country_code | NO |
| authorships[2].institutions[0].display_name | Norwegian University of Science and Technology |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Gareth T. Davies |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | Norwegian University of Science and Technology Trondheim, Norway#TAB# |
| authorships[3].author.id | https://openalex.org/A5015824727 |
| authorships[3].author.orcid | https://orcid.org/0000-0001-7317-8625 |
| authorships[3].author.display_name | Kristian Gjøsteen |
| authorships[3].countries | NO |
| authorships[3].affiliations[0].institution_ids | https://openalex.org/I204778367 |
| authorships[3].affiliations[0].raw_affiliation_string | Norwegian University of Science and Technology Trondheim, Norway#TAB# |
| authorships[3].institutions[0].id | https://openalex.org/I204778367 |
| authorships[3].institutions[0].ror | https://ror.org/05xg72x27 |
| authorships[3].institutions[0].type | education |
| authorships[3].institutions[0].lineage | https://openalex.org/I204778367 |
| authorships[3].institutions[0].country_code | NO |
| authorships[3].institutions[0].display_name | Norwegian University of Science and Technology |
| authorships[3].author_position | middle |
| authorships[3].raw_author_name | Kristian Gjøsteen |
| authorships[3].is_corresponding | False |
| authorships[3].raw_affiliation_strings | Norwegian University of Science and Technology Trondheim, Norway#TAB# |
| authorships[4].author.id | https://openalex.org/A5008385924 |
| authorships[4].author.orcid | https://orcid.org/0000-0002-3769-5307 |
| authorships[4].author.display_name | Mohsen Toorani |
| authorships[4].countries | NO |
| authorships[4].affiliations[0].institution_ids | https://openalex.org/I4432739 |
| authorships[4].affiliations[0].raw_affiliation_string | [University of Bergen, Bergen, Norway] |
| authorships[4].institutions[0].id | https://openalex.org/I4432739 |
| authorships[4].institutions[0].ror | https://ror.org/03zga2b32 |
| authorships[4].institutions[0].type | education |
| authorships[4].institutions[0].lineage | https://openalex.org/I4432739 |
| authorships[4].institutions[0].country_code | NO |
| authorships[4].institutions[0].display_name | University of Bergen |
| authorships[4].author_position | last |
| authorships[4].raw_author_name | Mohsen Toorani |
| authorships[4].is_corresponding | False |
| authorships[4].raw_affiliation_strings | [University of Bergen, Bergen, Norway] |
| has_content.pdf | True |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | http://hdl.handle.net/11250/2488888 |
| open_access.oa_status | gold |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Side channels in deduplication: trade-offs between leakage and efficiency. |
| has_fulltext | True |
| is_retracted | False |
| updated_date | 2025-10-10T17:16:08.811792 |
| primary_topic.id | https://openalex.org/T11614 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9986000061035156 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1710 |
| primary_topic.subfield.display_name | Information Systems |
| primary_topic.display_name | Cloud Data Security Solutions |
| related_works | https://openalex.org/W2820868167, https://openalex.org/W2999238718, https://openalex.org/W2529487138, https://openalex.org/W3090219188, https://openalex.org/W2913700460, https://openalex.org/W3110844206, https://openalex.org/W3094275505, https://openalex.org/W2550928167, https://openalex.org/W2949662684, https://openalex.org/W2942719460, https://openalex.org/W2886272469, https://openalex.org/W3021352973, https://openalex.org/W2886013909, https://openalex.org/W2885433324, https://openalex.org/W1545493325, https://openalex.org/W1913973877, https://openalex.org/W2899140020, https://openalex.org/W2996988296, https://openalex.org/W2925071685, https://openalex.org/W2767846115 |
| cited_by_count | 1 |
| counts_by_year[0].year | 2021 |
| counts_by_year[0].cited_by_count | 1 |
| locations_count | 3 |
| best_oa_location.id | pmh:oai:ntnuopen.ntnu.no:11250/2488888 |
| best_oa_location.is_oa | True |
| best_oa_location.source | |
| best_oa_location.license | other-oa |
| best_oa_location.pdf_url | http://hdl.handle.net/11250/2488888 |
| best_oa_location.version | submittedVersion |
| best_oa_location.raw_type | info:eu-repo/semantics/bookPart |
| best_oa_location.license_id | https://openalex.org/licenses/other-oa |
| best_oa_location.is_accepted | False |
| best_oa_location.is_published | False |
| best_oa_location.raw_source_name | 266-274 |
| best_oa_location.landing_page_url | http://hdl.handle.net/11250/2488888 |
| primary_location.id | pmh:oai:ntnuopen.ntnu.no:11250/2488888 |
| primary_location.is_oa | True |
| primary_location.source | |
| primary_location.license | other-oa |
| primary_location.pdf_url | http://hdl.handle.net/11250/2488888 |
| primary_location.version | submittedVersion |
| primary_location.raw_type | info:eu-repo/semantics/bookPart |
| primary_location.license_id | https://openalex.org/licenses/other-oa |
| primary_location.is_accepted | False |
| primary_location.is_published | False |
| primary_location.raw_source_name | 266-274 |
| primary_location.landing_page_url | http://hdl.handle.net/11250/2488888 |
| publication_date | 2016-01-01 |
| publication_year | 2016 |
| referenced_works_count | 0 |
| abstract_inverted_index.a | 36, 56, 65, 99, 108 |
| abstract_inverted_index.We | 79 |
| abstract_inverted_index.et | 42 |
| abstract_inverted_index.in | 89 |
| abstract_inverted_index.is | 68 |
| abstract_inverted_index.of | 4, 25, 38, 76, 91 |
| abstract_inverted_index.on | 10, 70 |
| abstract_inverted_index.or | 6, 63 |
| abstract_inverted_index.to | 55, 74 |
| abstract_inverted_index.we | 97 |
| abstract_inverted_index.al. | 43 |
| abstract_inverted_index.and | 31, 86, 105, 116 |
| abstract_inverted_index.but | 34 |
| abstract_inverted_index.for | 83, 101 |
| abstract_inverted_index.how | 46 |
| abstract_inverted_index.may | 60 |
| abstract_inverted_index.not | 64 |
| abstract_inverted_index.the | 11, 16, 20, 23, 26, 52, 71, 111 |
| abstract_inverted_index.data | 7 |
| abstract_inverted_index.file | 21, 67 |
| abstract_inverted_index.good | 103 |
| abstract_inverted_index.only | 18 |
| abstract_inverted_index.that | 59 |
| abstract_inverted_index.then | 106 |
| abstract_inverted_index.upon | 22 |
| abstract_inverted_index.user | 77 |
| abstract_inverted_index.Using | 94 |
| abstract_inverted_index.bound | 109 |
| abstract_inverted_index.files | 5 |
| abstract_inverted_index.gives | 51 |
| abstract_inverted_index.major | 29 |
| abstract_inverted_index.prove | 107 |
| abstract_inverted_index.terms | 90 |
| abstract_inverted_index.their | 87 |
| abstract_inverted_index.these | 95 |
| abstract_inverted_index.where | 15 |
| abstract_inverted_index.(2010) | 44 |
| abstract_inverted_index.Harnik | 41 |
| abstract_inverted_index.access | 54 |
| abstract_inverted_index.blocks | 8 |
| abstract_inverted_index.client | 17 |
| abstract_inverted_index.cloud. | 12 |
| abstract_inverted_index.copies | 3 |
| abstract_inverted_index.formal | 81 |
| abstract_inverted_index.number | 37 |
| abstract_inverted_index.showed | 45 |
| abstract_inverted_index.stored | 9, 69 |
| abstract_inverted_index.(noisy) | 57 |
| abstract_inverted_index.between | 114 |
| abstract_inverted_index.divulge | 61 |
| abstract_inverted_index.leading | 73 |
| abstract_inverted_index.leakage | 75 |
| abstract_inverted_index.provide | 80, 98 |
| abstract_inverted_index.removes | 1 |
| abstract_inverted_index.request | 24 |
| abstract_inverted_index.server, | 27, 72 |
| abstract_inverted_index.storage | 30 |
| abstract_inverted_index.uploads | 19 |
| abstract_inverted_index.whether | 62 |
| abstract_inverted_index.provides | 28 |
| abstract_inverted_index.savings, | 33 |
| abstract_inverted_index.security | 39, 88, 115 |
| abstract_inverted_index.adversary | 53 |
| abstract_inverted_index.bandwidth | 32 |
| abstract_inverted_index.concerns. | 40 |
| abstract_inverted_index.criterion | 100 |
| abstract_inverted_index.designing | 102 |
| abstract_inverted_index.necessary | 112 |
| abstract_inverted_index.redundant | 2 |
| abstract_inverted_index.trade-off | 113 |
| abstract_inverted_index.Clientside | 13 |
| abstract_inverted_index.advantage. | 93 |
| abstract_inverted_index.cross-user | 47 |
| abstract_inverted_index.inherently | 50 |
| abstract_inverted_index.introduces | 35 |
| abstract_inverted_index.particular | 66 |
| abstract_inverted_index.strategies | 85, 104 |
| abstract_inverted_index.adversarial | 92 |
| abstract_inverted_index.client-side | 48 |
| abstract_inverted_index.definitions | 82 |
| abstract_inverted_index.efficiency. | 117 |
| abstract_inverted_index.definitions, | 96 |
| abstract_inverted_index.information. | 78 |
| abstract_inverted_index.side-channel | 58 |
| abstract_inverted_index.Deduplication | 0 |
| abstract_inverted_index.deduplication | 49, 84 |
| abstract_inverted_index.characterizing | 110 |
| abstract_inverted_index.deduplication, | 14 |
| cited_by_percentile_year | |
| countries_distinct_count | 2 |
| institutions_distinct_count | 5 |
| citation_normalized_percentile |