1. Agrawal R, Kiernan J, Srikant R, Xu Y (2004) Order preserving encryption for numeric data. In: Proceedings of the 2004 ACM SIGMOD international conference on management of data, SIGMOD’04. ACM, New York, pp 563–574.
https://doi.org/10.1145/1007568.1007632
2. Alvim MS, Andrés ME (2011) On the relation between differential privacy and quantitative information flow. In: Proceedings of the 38th international conference on automata, languages and programming – volume part II, ICALP’11. Springer, Berlin/Heidelberg, pp 60–76.
http://dl.acm.org/citation.cfm?id=2027223.2027228
3. American Civil Liberties Union (2013) Privacy & technology.
https://www.aclu.org/issues/privacy-technology
4. Ashrafi N, Kuilboer JP (2018) A comparative study of privacy protection practices in the US, Europe, and Asia. Int J Inf Secur Priv (IJISP) 12(3):1–15.
https://doi.org/10.4018/IJISP.2018070101
5. Bordenabe NE (2014) Measuring privacy with distinguishability metrics: definitions, mechanisms and application to location privacy. Phd thesis