1. Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Order preserving encryption for numeric data. In: ACM International Conference on Management of Data, SIGMOD (2004)
2. Anati, I., Gueron, S., Johnson, S.P., Scarlata, V.R.: Innovative technology for CPU based attestation and sealing. In: Workshop on Hardware and Architectural Support for Security and Privacy, HASP (2013)
3. Limited, A.R.M.: ARM Security Technology - Building a Secure System using TrustZone Technology (2009)
4. Bajaj, S., Sion, R.: TrustedDB: A trusted hardware-based database with privacy and data confidentiality. IEEE Trans. Inf. Forensics Secur. 26, 752–765 (2014)
5. Baumann, A., Peinado, M., Hunt, G.: Shielding applications from an untrusted cloud with Haven. In: 11th USENIX Symposium on Operating Systems Design and Implementation, OSDI (2014)