Securing the e-health cloud, Proceedings of the ACM international conference on Health informatics, IHI '10, pp.220-229, 2010. ,
DOI : 10.1145/1882992.1883024
Probabilistic encryption & how to play mental poker keeping secret all partial information, Proceedings of the fourteenth annual ACM symposium on Theory of computing , STOC '82, pp.365-377, 1982. ,
DOI : 10.1145/800070.802212
A Cost-Effective Pay-Per-Multiplication Comparison Method for Millionaires, Proceedings of the Conference on Topics in Cryptology, pp.457-472, 2001. ,
DOI : 10.1007/3-540-45353-9_33
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes, Advances in Cryptology -EUROCRYPT '99, pp.223-238, 1999. ,
DOI : 10.1007/3-540-48910-X_16
A secure distributed framework for achieving k-anonymity, The VLDB Journal, vol.13, issue.4, pp.316-333, 2006. ,
DOI : 10.1007/s00778-006-0008-z
Privacy-Preserving Queries over Relational Databases, Proceedings of the International Conference on Privacy Enhancing Technologies, PETS'10, pp.75-92, 2010. ,
DOI : 10.1007/978-3-642-14527-8_5
Symmetrically-Private Database Search in Cloud Computing, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science, pp.671-678, 2013. ,
DOI : 10.1109/CloudCom.2013.95
Threshold Cryptosystems Based on Factoring, Proceedings of the Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology, pp.192-205, 2002. ,
DOI : 10.1007/3-540-36178-2_12
Mental Poker Revisited, Cryptography and Coding, pp.370-383, 2003. ,
DOI : 10.1007/978-3-540-40974-8_29
Efficient generation of shared RSA keys, Journal of the ACM, vol.48, issue.4, pp.702-722, 2001. ,
DOI : 10.1145/502090.502094
Protocols for Secure Computations, Proceedings of the 23rd Annual Symposium on Foundations of Computer Science, SFCS '82, pp.160-164, 1982. ,
Multidimensional binary search trees used for associative searching, Communications of the ACM, vol.18, issue.9, pp.509-517, 1975. ,
DOI : 10.1145/361002.361007
Distributed Paillier Cryptosystem without Trusted Dealer, Proceedings of the 11th International Conference on Information Security Applications, WISA'10, pp.44-60, 2011. ,
DOI : 10.1007/978-3-642-17955-6_4
Robust Efficient Distributed RSA-Key Generation, Proceedings of the 13th Annual ACM Symposium on Theory of Computing, STOC '98, pp.663-672, 1998. ,
FPGAs for trusted cloud computing, 22nd International Conference on Field Programmable Logic and Applications (FPL), pp.63-70, 2012. ,
DOI : 10.1109/FPL.2012.6339242
Foundations of Cryptography, 2001. ,
Privacy Preserving Data Mining, Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology, CRYPTO '00, pp.36-54, 2000. ,
Differential Privacy: A Survey of Results, Proceedings of the 5th International Conference on Theory and Applications of Models of Computation, TAMC'08, pp.1-19, 2008. ,
DOI : 10.1007/978-3-540-79228-4_1
Privacy Integrated Queries: An Extensible Platform for Privacy-Preserving Data Analysis, Proceedings of the 2009 SIGMOD International Conference on Management of data, pp.19-30, 2009. ,
Airavat: Security and Privacy for MapReduce, Proceedings of the 7th USENIX Conference on Networked Systems Design and Implementation, NSDI'10, pp.297-312, 2010. ,
Computational Geometry: Algorithms and Applications, 2008. ,
Cryptographic Protocols:: Theory and Implementation, 2010. ,
Secure data outsourcing, Proceedings of the conference on Very large data bases, VLDB '07, pp.1431-1432, 2007. ,
A Framework for Efficient Storage Security in RDBMS, Advances in Database Technology -EDBT 2004, pp.147-164, 2004. ,
DOI : 10.1007/978-3-540-24741-8_10
Efficient Execution of Aggregation Queries over Encrypted Relational Databases, Database Systems for Advanced Applications, pp.125-136, 2004. ,
DOI : 10.1007/978-3-540-24571-1_10
Order preserving encryption for numeric data, Proceedings of the 2004 ACM SIGMOD international conference on Management of data , SIGMOD '04, pp.563-574, 2004. ,
DOI : 10.1145/1007568.1007632
A Privacy-Preserving Index for Range Queries, Proceedings of the international conference on Very large data bases, pp.720-731, 2004. ,
DOI : 10.1016/B978-012088469-8.50064-4
CryptDB, Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, SOSP '11, pp.85-100, 2011. ,
DOI : 10.1145/2043556.2043566