Formalizations of secrecy of encrypted databases against realistic attackers | IEEE Conference Publication | IEEE Xplore