Order preserving encryption for numeric data, Proceedings of the 2004 ACM SIGMOD international conference on Management of data , SIGMOD '04, 2004. ,
DOI : 10.1145/1007568.1007632
URL : http://rakesh.agrawal-family.com/papers/sigmod04opes.pdf
Order-Preserving Symmetric Encryption, Proceedings of the 28th International Conference on Advances in Cryptology, EUROCRYPT, 2009. ,
DOI : 10.1109/TMC.2006.144
URL : http://www.cc.gatech.edu/~aboldyre/papers/bclo.pdf
Highlyscalable searchable symmetric encryption with support for boolean queries, Proceedings of the 33rd International Conference on Advances in Cryptology, CRYPTO, 2013. ,
DOI : 10.1007/978-3-642-40041-4_20
Fostering the Uptake of Secure Multiparty Computation in E-Commerce, 2008 Third International Conference on Availability, Reliability and Security, 2008. ,
DOI : 10.1109/ARES.2008.49
Searchable symmetric encryption, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, 2011. ,
DOI : 10.1145/1180405.1180417
Practical Private Range Search Revisited, Proceedings of the 2016 International Conference on Management of Data, SIGMOD '16, 2016. ,
DOI : 10.1007/978-3-642-15546-8_7
Practical Privacy-Preserving Multiparty Linear Programming Based on Problem Transformation, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing, 2011. ,
DOI : 10.1109/PASSAT/SocialCom.2011.19
URL : https://hal.archives-ouvertes.fr/hal-01338043
Encrypting Analytical Web Applications, Proceedings of the 2016 ACM on Cloud Computing Security Workshop, CCSW '16, 2016. ,
DOI : 10.1109/CCGrid.2013.109
Efficient execution of aggregation queries over encrypted relational databases, Proceedings of the 9th International Conference on Database Systems for Advances Applications, 2004. ,
Executing sql over encrypted data in the database-service-provider model, Proceedings of the 2002 ACM International Conference on Management of Data, SIGMOD, 2002. ,
Searchable Encryption with Secure and Efficient Updates, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, 2014. ,
DOI : 10.1145/233551.233553
Poly-Logarithmic Range Queries on Encrypted Data with Small Leakage, Proceedings of the 2016 ACM on Cloud Computing Security Workshop, CCSW '16, 2016. ,
DOI : 10.1109/ICDE.2013.6544835
ENKI, Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, SIGMOD '15, 2015. ,
DOI : 10.1504/IJACT.2009.028029
Sok: Privacy technologies for smart grids ? a survey of options, 2012. ,
Building a privacy-preserving benchmarking enterprise system, Enterprise Information Systems, 2008. ,
DOI : 10.1109/edoc.2007.13
URL : http://www.fkerschbaum.org/edoc07.pdf
Practical Privacy-Preserving Benchmarking, Proceedings of the IFIP International Information Security Conference, SEC, 2008. ,
DOI : 10.1007/978-0-387-09699-5_2
A verifiable, centralized, coercion-free reputation system, Proceedings of the 8th ACM workshop on Privacy in the electronic society, WPES '09, 2009. ,
DOI : 10.1145/1655188.1655197
An access control model for mobile physical objects, Proceeding of the 15th ACM symposium on Access control models and technologies, SACMAT '10, 2010. ,
DOI : 10.1145/1809842.1809873
Frequency-Hiding Order-Preserving Encryption, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15, 2015. ,
DOI : 10.1109/ICDE.2006.150
On the practical importance of communication complexity for secure multi-party computation protocols, Proceedings of the 2009 ACM symposium on Applied Computing, SAC '09, 2009. ,
DOI : 10.1145/1529282.1529730
Privacy-Preserving Pattern Matching for Anomaly Detection in RFID Anti-Counterfeiting, Proceedings of the International Workshop on Radio Frequency Identification: Security and Privacy Issues, 2010. ,
DOI : 10.1007/978-3-642-16822-2_12
Automatic Protocol Selection in Secure Two-Party Computations, Proceedings of the 12th International Conference on Applied Cryptography and Network Security, ACNS, 2014. ,
DOI : 10.1007/978-3-319-07536-5_33
Optimal average-complexity ideal-security orderpreserving encryption, Proceedings of the 21st ACM Conference on Computer and Communications Security, CCS, 2014. ,
DOI : 10.1145/2660267.2660277
Secure collaboratiue supply-chain management, IEEE Computer, issue.9, p.44, 2011. ,
RFID-based supply chain partner authentication and key agreement, Proceedings of the second ACM conference on Wireless network security, WiSec '09, 2009. ,
DOI : 10.1145/1514274.1514281
Filtering for Private Collaborative Benchmarking, Proceedings of the International Conference on Emerging Trends in Information and Communication Security, 2006. ,
DOI : 10.1109/SFCS.1982.38
Inference Attacks on Property-Preserving Encrypted Databases, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15, 2014. ,
DOI : 10.1007/11863908_29
An ideal-security protocol for orderpreserving encoding, Proceedings of the 34th IEEE Symposium on Security and Privacy, p.2013 ,
DOI : 10.1109/sp.2013.38
URL : http://doi.org/10.1109/sp.2013.38
CryptDB, Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, SOSP '11, 2011. ,
DOI : 10.1145/2043556.2043566
URL : http://dspace.mit.edu/bitstream/1721.1/74107/1/cryptdb-sosp11.pdf
Processing analytical queries over encrypted data, Proceedings of the 39th International Conference on Very Large Data Bases, 2013. ,
DOI : 10.14778/2535573.2488336
URL : http://dspace.mit.edu/bitstream/1721.1/87023/1/tu-monomi-cr-vldb13.pdf