Sampling Attacks Against Hidden Databases
Efficient resource allocation for device to-device
[IJCT-V2I2P23] Authors : Radhya Sahal,Sherif M. Khattab, Fatma A. Omara