Content deleted Content added
No edit summary |
m v2.04b - Bot T20 CW#61 - Fix errors for CW project (Reference before punctuation) |
||
Line 36:
SSE security can be analyzed in several adversarial models but the most common are:
* the persistent model,<ref name=":1" />
* the snapshot model,<ref name=":4">{{Cite journal|last=Amjad|first=Ghous|last2=Kamara|first2=Seny|last3=Moataz|first3=Tarik|date=2019-01-01|title=Breach-Resistant Structured Encryption|url=https://www.sciendo.com/article/10.2478/popets-2019-0014|journal=Proceedings on Privacy Enhancing Technologies|language=en|volume=2019|issue=1|pages=245–265|doi=10.2478/popets-2019-0014}}</ref>
=== Security in the Persistent Model ===
|