J. Algesheimer, C. Cachin, J. Camenisch, and G. Karjoth, Cryptographic security for mobile code, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, pp.2-11, 2001.
DOI : 10.1109/SECPRI.2001.924283

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.13.824

. Amazon, Elastic Block Store (EBS) http://aws.amazon.com/ebs, 2011.

. Amazon, Elastic Compute Cloud (EC2) http://aws.amazon.com/ec2, 2011.

M. Atallah, K. Pantazopoulos, J. Rice, and E. Spafford, Secure outsourcing of scientific computations, Advances in Computers, vol.54, pp.216-272, 2001.
DOI : 10.1016/S0065-2458(01)80019-X

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.158.9763

M. Bellare, P. Rogaway, and D. Wagner, The EAX Mode of Operation, FSE'04, pp.389-407, 2004.
DOI : 10.1007/978-3-540-25937-4_25

D. Boneh, E. Goh, and K. Nissim, Evaluating 2-DNF Formulas on Ciphertexts, TCC'05, pp.325-341, 2005.
DOI : 10.1007/978-3-540-30576-7_18

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.120.6692

S. Bugiel, S. Nürnberger, A. Sadeghi, and T. Schneider, Twin Clouds: An architecture for secure cloud computing (Extended Abstract) Workshop on Cryptography and Security in Clouds, 2011.

K. Chung, Y. Kalai, and S. Vadhan, Improved Delegation of Computation Using Fully Homomorphic Encryption, CRYPTO'10, pp.483-501, 2010.
DOI : 10.1007/978-3-642-14623-7_26

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.303.1430

. Cloud-security-alliance, Top threats to cloud computing, 2010.

R. Gennaro, C. Gentry, and B. Parno, Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers, CRYPTO'10, pp.465-482, 2010.
DOI : 10.1007/978-3-642-14623-7_25

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.164.1571

C. Gentry, Fully homomorphic encryption using ideal lattices, Proceedings of the 41st annual ACM symposium on Symposium on theory of computing, STOC '09, pp.169-178, 2009.
DOI : 10.1145/1536414.1536440

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.362.7592

C. Gentry and S. Halevi, Implementing Gentry???s Fully-Homomorphic Encryption Scheme, EUROCRYPT'11, 2011.
DOI : 10.1007/978-3-642-20465-4_9

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.400.6183

S. Goldwasser, Y. Kalai, and G. Rothblum, One-Time Programs, CRYPTO'08, pp.39-56, 2008.
DOI : 10.1007/978-3-540-85174-5_3

S. Halevi, Y. Lindell, and B. Pinkas, Secure Computation on the Web: Computing without Simultaneous Interaction, Cryptology ePrint Archive, vol.157, 2011.
DOI : 10.1007/978-3-642-22792-9_8

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.220.7744

W. Henecka, S. Kögl, A. Sadeghi, T. Schneider, and I. Wehrenberg, TASTY, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pp.451-462, 2010.
DOI : 10.1145/1866307.1866358

A. Herzberg and H. Shulman, Secure guaranteed computation, Cryptology ePrint Archive Report, vol.449, 2010.

S. Hohenberger and A. Lysyanskaya, How to Securely Outsource Cryptographic Computations, TCC'05, pp.264-282, 2005.
DOI : 10.1007/978-3-540-30576-7_15

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.120.2617

A. Iliev, Hardware-Assisted Secure Computation, 2009.
DOI : 10.1349/ddlp.298

A. Iliev and S. Smith, Small, stupid, and scalable, Proceedings of the fifth ACM workshop on Scalable trusted computing, STC '10, pp.41-52, 2010.
DOI : 10.1145/1867635.1867643

K. Järvinen, V. Kolesnikov, A. Sadeghi, and T. Schneider, Embedded SFE: Offloading Server and Network Using Hardware Tokens, FC'10, pp.207-221, 2010.
DOI : 10.1007/978-3-642-14577-3_17

K. Järvinen, V. Kolesnikov, A. Sadeghi, and T. Schneider, Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs, CHES'10, pp.383-397, 2010.
DOI : 10.1007/978-3-642-15031-9_26

S. Kamara and K. Lauter, Cryptographic Cloud Storage, Real-Life Cryptographic Protocols and Standardization, pp.136-149, 2010.
DOI : 10.1007/978-3-642-14992-4_13

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.159.4794

V. Kolesnikov and T. Schneider, Improved Garbled Circuit: Free XOR Gates and Applications, ICALP'08, pp.486-498, 2008.
DOI : 10.1007/978-3-540-70583-3_40

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.160.5268

J. Loftus and N. Smart, Secure Outsourced Computation, AFRICACRYPT'11, 2011.
DOI : 10.1007/978-3-642-13013-7_25

D. Malkhi, N. Nisan, B. Pinkas, and Y. Sella, Fairplay ? a secure two-party computation system, Security, pp.287-302, 2004.

M. Naor, B. Pinkas, and R. Sumner, Privacy preserving auctions and mechanism design, Proceedings of the 1st ACM conference on Electronic commerce , EC '99, pp.129-139, 1999.
DOI : 10.1145/336992.337028

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.17.7459

P. Paillier, Public-Key Cryptosystems Based on Composite Degree Residuosity Classes, EUROCRYPT'99, pp.223-238, 1999.
DOI : 10.1007/3-540-48910-X_16

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.112.4035

A. Paus, A. Sadeghi, and T. Schneider, Practical Secure Evaluation of Semi-private Functions, ACNS'09, pp.89-106, 2009.
DOI : 10.1007/978-3-540-85855-3_2

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.219.2759

B. Pinkas, T. Schneider, N. Smart, and S. Williams, Secure Two-Party Computation Is Practical, ASIACRYPT'09, pp.250-267, 2009.
DOI : 10.1007/978-3-642-10366-7_15

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.215.2341

T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, Hey, you, get off of my cloud, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pp.199-212, 2009.
DOI : 10.1145/1653662.1653687

R. L. Rivest, A. Shamir, and L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol.21, issue.2, pp.120-126, 1978.
DOI : 10.1145/359340.359342

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.40.5588

A. Sadeghi, T. Schneider, and M. Winandy, Token-Based Cloud Computing, TRUST'10 Workshop on Trust in the Cloud, pp.417-429, 2010.
DOI : 10.1007/978-3-642-13869-0_30

R. Sailer, X. Zhang, T. Jaeger, and L. Van-doorn, Design and implementation of a TCG-based integrity measurement architecture, 2004.

N. Santos, K. Gummadi, and R. Rodrigues, Towards trusted cloud computing, Hot Topics in Cloud Computing (HotCloud'09, 2009.

J. Schiffman, T. Moyer, H. Vijayakumar, T. Jaeger, and P. Mcdaniel, Seeding clouds with trust anchors, Proceedings of the 2010 ACM workshop on Cloud computing security workshop, CCSW '10, pp.43-46, 2010.
DOI : 10.1145/1866835.1866843

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.364.1993

N. Smart and F. Vercauteren, Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes, PKC'10, pp.420-443, 2010.
DOI : 10.1007/978-3-642-13013-7_25

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.215.3315

J. R. Troncoso-pastoriza and F. Pérez-gonzález, CryptoDSPs for Cloud Privacy, Workshop on Cloud Information System Engineering (CISE'10), 2010.
DOI : 10.1109/TIFS.2011.2109385

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.185.429

M. Van-dijk, C. Gentry, S. Halevi, and V. Vaikuntanathan, Fully Homomorphic Encryption over the Integers, EUROCRYPT'10, pp.24-43, 2010.
DOI : 10.1007/978-3-642-13190-5_2

M. Van-dijk and A. Juels, On the impossibility of cryptography alone for privacypreserving cloud computing, HotSec'10, pp.1-8, 2010.

A. C. Yao, How to generate and exchange secrets, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986), pp.162-167, 1986.
DOI : 10.1109/SFCS.1986.25