Linked Presentation: d-DSE: Distinct Dynamic Searchable Encryption Resisting Volume Leakage in Encrypted DatabasesFakeBehalf: Imperceptible Email Spoofing Attacks against the Delegation Mechanism in Email SystemsYou Can Obfuscate, but You Cannot Hide: CrossPoint Attacks against Network Topology Obfuscation