1. Abdelraheem, M.A., Gehrmann, C., Lindström, M., Nordahl, C.: Executing boolean queries on an encrypted bitmap index. In: Proceedings of the 2016 ACM on Cloud Computing Security Workshop, pp. 11–22. ACM (2016)
2. Aggarwal, G., Bawa, M., Ganesan, P., Garcia-Molina, H., Kenthapadi, K., Motwani, R., Srivastava, U., Thomas, D., Xu, Y.: Two can keep a secret: a distributed architecture for secure database services. In: CIDR 2005 (2005)
3. Portuguese banking institution. Bank marketing data set (2014). https://archive.ics.uci.edu/ml/datasets/Bank+Marketing . Accessed June 2017
4. Bost, R.: $$\sigma $$o$$\varphi $$o$$\varsigma $$: forward secure searchable encryption. In: CCS 2016 (2016)
5. Cash, D., Grubbs, P., Perry, J., Ristenpart, T.: Leakage-abuse attacks against searchable encryption. In: Proceedings of CCS 2015 (2015)