1. Agrawal R, Kiernan J, Srikant R, Xu Y (2004) Order- preserving encryption for numeric data. In: SIGMOD 2004, pp. 563–574. ACM, New York
2. Besher KM, Subah Z, Ali MZ IoT Sensor Initiated Healthcare Data Security, in IEEE Sens J. https://doi.org/10.1109/JSEN.2020.3013634.
3. Boldyreva A, Chenette N, Lee Y, O’Neill A (2009) Order-preserving symmetric encryption, advances in cryptology - EUROCRYPT 2009. Lecture Notes in Com- puter Science, vol 5479
4. Borse Manoj V, Bhandure Harshad D, Patil Dhiraj M, Bhad Pratik B (2014) Location Based Encryption-Decryption Approach for Data Security, Int J Comput Appl Technol Res. Volume 3– Issue 10, 610–611
5. Cao N, Wang C, Li M, Ren K, Lou W (2011) Privacy-preserving multi-keyword ranked search over encrypted cloud data, Proc IEEE INFOCOM, pp. 829–837