, AOL Search Log Special, 2007.
, AOL Search Data Shows Users Planning to commit Murder, 2007.
Tor: the second-generation onion router, DTIC Document, Tech. Rep, 2004. ,
Dissent: accountable anonymous group messaging, CCS, pp.340-350, 2010. ,
Rac: a freerider-resilient, scalable, anonymous communication protocol, ICDCS, pp.520-529, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-00945795
Web search query privacy: evaluating query obfuscation and anonymizing networks, Journal of Computer Security, vol.22, issue.1, pp.155-199, 2014. ,
Simattack: Private web search under fire, Journal of Internet Services and Applications, vol.7, issue.1, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01304320
Trackmenot: resisting surveillance in web search, Lessons from the Identity Trail: Anonymity, Privacy, and Identity in a Networked Society, vol.23, pp.417-436, 2009. ,
H(k)private information retrieval from privacy-uncooperative queryable databases, Online Information Review, vol.33, issue.4, pp.720-744, 2009. ,
Peas: Private, efficient and accurate web search, Trustcom, vol.1, pp.571-580, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01159179
X-search: revisiting private web search using intel sgx, pp.198-208, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01588883
A picture of search, 2006. ,
Fully homomorphic encryption using ideal lattices, Proceedings of the Forty-first Annual ACM Symposium on Theory of Computing, ser. STOC '09, pp.169-178, 2009. ,
Secure multi-party computation problems and their applications: A review and open problems, Proceedings of the 2001 workshop on New security paradigms, pp.13-22, 2001. ,
Embellishing text search queries to protect user privacy, Proc. VLDB Endow, vol.3, issue.1-2, pp.598-607, 2010. ,
Onion routing, Communications of the ACM, vol.42, issue.2, pp.39-41, 1999. ,
Dissent in numbers: making strong anonymity scale, OSDI, pp.179-182, 2012. ,
A memory encryption engine suitable for general purpose processors, IACR Cryptology ePrint Archive, vol.2016, pp.197-204, 2016. ,
Securekeeper: confidential zookeeper using intel sgx, Middleware, vol.14, p.13, 2016. ,
Scone: secure linux containers with intel sgx, pp.689-703, 2016. ,
Intel R software guard extensions (intel R sgx) support for dynamic memory management inside an enclave, HASP, vol.10, p.9, 2016. ,
, , 2016.
Trustjs: trusted client-side execution of javascript, EuroSec, vol.7, pp.1-7, 2017. ,
, Press Release 8th Generation Intel Core, 2017.
Asyncshock: exploiting synchronisation bugs in intel sgx enclaves, ESORICS, pp.440-457, 2016. ,
Controlled-channel attacks: deterministic side channels for untrusted operating systems, S&P, pp.640-656, 2015. ,
DOI : 10.1109/sp.2015.45
T-sgx: eradicating controlled-channel attacks against enclave programs, NDSS, 2017. ,
DOI : 10.14722/ndss.2017.23193
Sgx-lapd: thwarting controlled side channel attacks via enclave verifiable page faults, pp.357-380, 2017. ,
DOI : 10.1007/978-3-319-66332-6_16
Sgxio: generic trusted i/o path for intel sgx, pp.261-268, 2017. ,
Reaching agreement in the presence of faults, Journal of the ACM, vol.27, issue.2, pp.228-234, 1980. ,
The byzantine generals problem, ACM Transactions on Programming Languages and Systems, vol.4, issue.3, pp.382-401, 1982. ,
DOI : 10.1145/357172.357176
URL : http://www.cs.wisc.edu/~bart/739/papers/byzantine.pdf
, Google Privacy & Terms, 2017.
Latent dirichlet allocation, Journal of Machine Learning Research, vol.3, pp.993-1022, 2003. ,
, , 2017.
Gossip-based peer sampling, ACM Transactions Computing System, vol.25, issue.3, 2007. ,
WordNet: an electronic lexical database, 1998. ,
Mallet: A machine learning for language toolkit ,
Deep tags: toward a quantitative analysis of online pornography, Porn Studies, vol.1, issue.1, pp.80-95, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-00937745
Quantifying web-search privacy, CCS, pp.966-977, 2014. ,
, , 2017.
, How mobile latency impacts publisher revenue, 2017.
, Knowledge Graph Search API, 2017.