H. Löhr, A. Sadeghi, and M. Winandy, Securing the e-health cloud, Proceedings of the ACM international conference on Health informatics, IHI '10, pp.220-229, 2010.
DOI : 10.1145/1882992.1883024

S. Goldwasser and S. Micali, Probabilistic encryption & how to play mental poker keeping secret all partial information, Proceedings of the fourteenth annual ACM symposium on Theory of computing , STOC '82, pp.365-377, 1982.
DOI : 10.1145/800070.802212

M. Fischlin, A Cost-Effective Pay-Per-Multiplication Comparison Method for Millionaires, Proceedings of the Conference on Topics in Cryptology, pp.457-472, 2001.
DOI : 10.1007/3-540-45353-9_33

P. Paillier, Public-Key Cryptosystems Based on Composite Degree Residuosity Classes, Advances in Cryptology -EUROCRYPT '99, pp.223-238, 1999.
DOI : 10.1007/3-540-48910-X_16

W. Jiang and C. Clifton, A secure distributed framework for achieving k-anonymity, The VLDB Journal, vol.13, issue.4, pp.316-333, 2006.
DOI : 10.1007/s00778-006-0008-z

F. Olumofin and I. Goldberg, Privacy-Preserving Queries over Relational Databases, Proceedings of the International Conference on Privacy Enhancing Technologies, PETS'10, pp.75-92, 2010.
DOI : 10.1007/978-3-642-14527-8_5

S. Barouti, D. Alhadidi, and M. Debbabi, Symmetrically-Private Database Search in Cloud Computing, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science, pp.671-678, 2013.
DOI : 10.1109/CloudCom.2013.95

J. Katz and M. Yung, Threshold Cryptosystems Based on Factoring, Proceedings of the Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology, pp.192-205, 2002.
DOI : 10.1007/3-540-36178-2_12

A. Barnett and N. P. Smart, Mental Poker Revisited, Cryptography and Coding, pp.370-383, 2003.
DOI : 10.1007/978-3-540-40974-8_29

D. Boneh and M. Franklin, Efficient generation of shared RSA keys, Journal of the ACM, vol.48, issue.4, pp.702-722, 2001.
DOI : 10.1145/502090.502094

C. Andrew and . Yao, Protocols for Secure Computations, Proceedings of the 23rd Annual Symposium on Foundations of Computer Science, SFCS '82, pp.160-164, 1982.

J. L. Bentley, Multidimensional binary search trees used for associative searching, Communications of the ACM, vol.18, issue.9, pp.509-517, 1975.
DOI : 10.1145/361002.361007

T. Nishide and K. Sakurai, Distributed Paillier Cryptosystem without Trusted Dealer, Proceedings of the 11th International Conference on Information Security Applications, WISA'10, pp.44-60, 2011.
DOI : 10.1007/978-3-642-17955-6_4

Y. Frankel, P. D. Mackenzie, and M. Yung, Robust Efficient Distributed RSA-Key Generation, Proceedings of the 13th Annual ACM Symposium on Theory of Computing, STOC '98, pp.663-672, 1998.

K. Eguro and R. Venkatesan, FPGAs for trusted cloud computing, 22nd International Conference on Field Programmable Logic and Applications (FPL), pp.63-70, 2012.
DOI : 10.1109/FPL.2012.6339242

O. Goldreich, Foundations of Cryptography, 2001.

Y. Lindell and B. Pinkas, Privacy Preserving Data Mining, Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology, CRYPTO '00, pp.36-54, 2000.

C. Dwork, Differential Privacy: A Survey of Results, Proceedings of the 5th International Conference on Theory and Applications of Models of Computation, TAMC'08, pp.1-19, 2008.
DOI : 10.1007/978-3-540-79228-4_1

D. Frank and . Mcsherry, Privacy Integrated Queries: An Extensible Platform for Privacy-Preserving Data Analysis, Proceedings of the 2009 SIGMOD International Conference on Management of data, pp.19-30, 2009.

I. Roy, T. V. Srinath, A. Setty, V. Kilzer, E. Shmatikov et al., Airavat: Security and Privacy for MapReduce, Proceedings of the 7th USENIX Conference on Networked Systems Design and Implementation, NSDI'10, pp.297-312, 2010.

M. De-berg, O. Cheong, M. Van-kreveld, and M. Overmars, Computational Geometry: Algorithms and Applications, 2008.

M. Geisler, Cryptographic Protocols:: Theory and Implementation, 2010.

R. Sion, Secure data outsourcing, Proceedings of the conference on Very large data bases, VLDB '07, pp.1431-1432, 2007.

B. Iyer, S. Mehrotra, E. Mykletun, G. Tsudik, and Y. Wu, A Framework for Efficient Storage Security in RDBMS, Advances in Database Technology -EDBT 2004, pp.147-164, 2004.
DOI : 10.1007/978-3-540-24741-8_10

H. Hacigümü¸hacigümü¸s, B. Iyer, and S. Mehrotra, Efficient Execution of Aggregation Queries over Encrypted Relational Databases, Database Systems for Advanced Applications, pp.125-136, 2004.
DOI : 10.1007/978-3-540-24571-1_10

R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, Order preserving encryption for numeric data, Proceedings of the 2004 ACM SIGMOD international conference on Management of data , SIGMOD '04, pp.563-574, 2004.
DOI : 10.1145/1007568.1007632

B. Hore, . Sh, G. Mehrotra, and . Tsudik, A Privacy-Preserving Index for Range Queries, Proceedings of the international conference on Very large data bases, pp.720-731, 2004.
DOI : 10.1016/B978-012088469-8.50064-4

R. A. Popa, C. M. Redfield, N. Zeldovich, and H. Balakrishnan, CryptDB, Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, SOSP '11, pp.85-100, 2011.
DOI : 10.1145/2043556.2043566