R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, Order preserving encryption for numeric data, Proceedings of the 2004 ACM SIGMOD international conference on Management of data , SIGMOD '04, 2004.
DOI : 10.1145/1007568.1007632

URL : http://rakesh.agrawal-family.com/papers/sigmod04opes.pdf

A. Boldyreva, N. Chenette, Y. Lee, and A. O. Neill, Order-Preserving Symmetric Encryption, Proceedings of the 28th International Conference on Advances in Cryptology, EUROCRYPT, 2009.
DOI : 10.1109/TMC.2006.144

URL : http://www.cc.gatech.edu/~aboldyre/papers/bclo.pdf

D. Cash, S. Jarecki, C. Jutla, H. Krawczyk, M. Rosu et al., Highlyscalable searchable symmetric encryption with support for boolean queries, Proceedings of the 33rd International Conference on Advances in Cryptology, CRYPTO, 2013.
DOI : 10.1007/978-3-642-40041-4_20

O. Catrina and F. Kerschbaum, Fostering the Uptake of Secure Multiparty Computation in E-Commerce, 2008 Third International Conference on Availability, Reliability and Security, 2008.
DOI : 10.1109/ARES.2008.49

R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, Searchable symmetric encryption, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, 2011.
DOI : 10.1145/1180405.1180417

I. Demertzis, S. Papadopoulos, O. Papapetrou, A. Deligiannakis, and M. Garofalakis, Practical Private Range Search Revisited, Proceedings of the 2016 International Conference on Management of Data, SIGMOD '16, 2016.
DOI : 10.1007/978-3-642-15546-8_7

J. Dreier and F. Kerschbaum, Practical Privacy-Preserving Multiparty Linear Programming Based on Problem Transformation, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing, 2011.
DOI : 10.1109/PASSAT/SocialCom.2011.19

URL : https://hal.archives-ouvertes.fr/hal-01338043

B. Fuhry, W. Tighzert, and F. Kerschbaum, Encrypting Analytical Web Applications, Proceedings of the 2016 ACM on Cloud Computing Security Workshop, CCSW '16, 2016.
DOI : 10.1109/CCGrid.2013.109

H. Hacigümüs, B. Iyer, and S. Mehrotra, Efficient execution of aggregation queries over encrypted relational databases, Proceedings of the 9th International Conference on Database Systems for Advances Applications, 2004.

H. Hacigümüs, B. R. Iyer, C. Li, and S. Mehrotra, Executing sql over encrypted data in the database-service-provider model, Proceedings of the 2002 ACM International Conference on Management of Data, SIGMOD, 2002.

F. Hahn and F. Kerschbaum, Searchable Encryption with Secure and Efficient Updates, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, 2014.
DOI : 10.1145/233551.233553

F. Hahn and F. Kerschbaum, Poly-Logarithmic Range Queries on Encrypted Data with Small Leakage, Proceedings of the 2016 ACM on Cloud Computing Security Workshop, CCSW '16, 2016.
DOI : 10.1109/ICDE.2013.6544835

I. Hang, F. Kerschbaum, and E. Damiani, ENKI, Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, SIGMOD '15, 2015.
DOI : 10.1504/IJACT.2009.028029

M. Jawurek, F. Kerschbaum, and G. Danezis, Sok: Privacy technologies for smart grids ? a survey of options, 2012.

F. Kerschbaum, Building a privacy-preserving benchmarking enterprise system, Enterprise Information Systems, 2008.
DOI : 10.1109/edoc.2007.13

URL : http://www.fkerschbaum.org/edoc07.pdf

F. Kerschbaum, Practical Privacy-Preserving Benchmarking, Proceedings of the IFIP International Information Security Conference, SEC, 2008.
DOI : 10.1007/978-0-387-09699-5_2

F. Kerschbaum, A verifiable, centralized, coercion-free reputation system, Proceedings of the 8th ACM workshop on Privacy in the electronic society, WPES '09, 2009.
DOI : 10.1145/1655188.1655197

F. Kerschbaum, An access control model for mobile physical objects, Proceeding of the 15th ACM symposium on Access control models and technologies, SACMAT '10, 2010.
DOI : 10.1145/1809842.1809873

F. Kerschbaum, Frequency-Hiding Order-Preserving Encryption, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15, 2015.
DOI : 10.1109/ICDE.2006.150

F. Kerschbaum, D. Dahlmeier, A. Schröpfer, and D. Biswas, On the practical importance of communication complexity for secure multi-party computation protocols, Proceedings of the 2009 ACM symposium on Applied Computing, SAC '09, 2009.
DOI : 10.1145/1529282.1529730

F. Kerschbaum and N. Oertel, Privacy-Preserving Pattern Matching for Anomaly Detection in RFID Anti-Counterfeiting, Proceedings of the International Workshop on Radio Frequency Identification: Security and Privacy Issues, 2010.
DOI : 10.1007/978-3-642-16822-2_12

F. Kerschbaum, T. Schneider, and A. Schröpfer, Automatic Protocol Selection in Secure Two-Party Computations, Proceedings of the 12th International Conference on Applied Cryptography and Network Security, ACNS, 2014.
DOI : 10.1007/978-3-319-07536-5_33

F. Kerschbaum and A. Schröpfer, Optimal average-complexity ideal-security orderpreserving encryption, Proceedings of the 21st ACM Conference on Computer and Communications Security, CCS, 2014.
DOI : 10.1145/2660267.2660277

F. Kerschbaum, A. Schröpfer, A. Zilli, R. Pibernik, O. Catrina et al., Secure collaboratiue supply-chain management, IEEE Computer, issue.9, p.44, 2011.

F. Kerschbaum and A. Sorniotti, RFID-based supply chain partner authentication and key agreement, Proceedings of the second ACM conference on Wireless network security, WiSec '09, 2009.
DOI : 10.1145/1514274.1514281

F. Kerschbaum and O. Terzidis, Filtering for Private Collaborative Benchmarking, Proceedings of the International Conference on Emerging Trends in Information and Communication Security, 2006.
DOI : 10.1109/SFCS.1982.38

M. Naveed, S. Kamara, and C. Wright, Inference Attacks on Property-Preserving Encrypted Databases, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15, 2014.
DOI : 10.1007/11863908_29

R. A. Popa, F. H. Li, and N. Zeldovich, An ideal-security protocol for orderpreserving encoding, Proceedings of the 34th IEEE Symposium on Security and Privacy, p.2013
DOI : 10.1109/sp.2013.38

URL : http://doi.org/10.1109/sp.2013.38

R. A. Popa, C. M. Redfield, N. Zeldovich, and H. Balakrishnan, CryptDB, Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, SOSP '11, 2011.
DOI : 10.1145/2043556.2043566

URL : http://dspace.mit.edu/bitstream/1721.1/74107/1/cryptdb-sosp11.pdf

S. Tu, M. F. Kaashoek, S. Madden, and N. Zeldovich, Processing analytical queries over encrypted data, Proceedings of the 39th International Conference on Very Large Data Bases, 2013.
DOI : 10.14778/2535573.2488336

URL : http://dspace.mit.edu/bitstream/1721.1/87023/1/tu-monomi-cr-vldb13.pdf