D. Barrington, Bounded-width polynomial-size branching programs recognize exactly those languages in NC 1, Journal of Computer and System Sciences, vol.38, pp.1-150, 1989.
DOI : 10.1016/0022-0000(89)90037-8

URL : http://doi.org/10.1016/0022-0000(89)90037-8

U. Feige, J. Kilian, and M. Naor, A minimal model for secure computation (extended abstract), Proceedings of the twenty-sixth annual ACM symposium on Theory of computing , STOC '94, pp.554-563
DOI : 10.1145/195058.195408

L. Opyrchal, A. Prakash, and A. , Supporting Privacy Policies in a Publish-Subscribe Substrate for Pervasive Environments, Journal of Networks, vol.2, issue.1, 2007.
DOI : 10.4304/jnw.2.1.17-26

M. Klonowski, M. Kutylowski, and B. Rozanski, Privacy Protection for P2P Publish-Subscribe Networks, Security and Protection of Information, pp.63-74, 2005.

M. Nabeel, N. Shang, and E. Bertino, Privacy-Preserving Filtering and Covering in Content- Based Publish Subscribe Systems, 2009.
DOI : 10.1145/2295136.2295164

D. Boneh and B. Waters, Conjunctive, Subset, and Range Queries on Encrypted Data, Proceedings of the 4 th Conference on Theory of Cryptography, pp.536-554, 2007.
DOI : 10.1007/978-3-540-70936-7_29

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.61.5164

V. Iovino and G. Persiano, Hidden-Vector Encryption with Groups of Prime Order, Proceedings of the 2 nd International Conference on Pairing-Based Cryptography, pp.75-88, 2008.
DOI : 10.1007/978-3-540-85538-5_5

J. Bethencourt, A. Sahai, and B. Waters, Ciphertext-Policy Attribute-Based Encryption, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.321-334, 2007.
DOI : 10.1109/SP.2007.11

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.69.3744

E. Shen, E. Shi, and B. Waters, Predicate Privacy in Encryption Systems, Proceedings of the 6 th Conference on Theory of Cryptography, pp.457-473, 2009.
DOI : 10.1007/978-3-642-00457-5_27

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.153.2725

S. Jarecki and V. Shmatikov, Efficient Two-Party Secure Computation on Committed Inputs, EuroCrypt 2007, pp.97-114
DOI : 10.1007/978-3-540-72540-4_6

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.78.7883

C. Gentry, Fully homomorphic encryption using ideal lattices, Proceedings of the 41st annual ACM symposium on Symposium on theory of computing, STOC '09, pp.169-178
DOI : 10.1145/1536414.1536440

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.362.7592

J. Kilian, Founding Cryptography on Oblivious Transfer, Proceedings of the 20 th Annual ACM Symposium on the Theory of Computation (STOC), 1988.

A. Software-foundation and . Activemq, Accessible from (Last Accessed 5, 2012.

J. Bethencourt, A. Sahai, B. Waters, . Cp-abe, and . Library, Accessible from (Last Accessed 5, 2012.

R. Ostrovsky and W. E. Skeith, Private Searching on Streaming Data, Journal of Cryptology, vol.20, issue.4, pp.397-430, 2007.
DOI : 10.1007/s00145-007-0565-3

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.131.7131