Update Recovery Attacks on Encrypted Database Within Two Updates Using Range Queries Leakage | IEEE Journals & Magazine | IEEE Xplore