1. Abrams, L. (2020). Hacker leaks 386 million user records from 18 companies for free. https://www.bleepingcomputer.com/news/security/hacker-leaks-386-million-user-records-from-18-companies-for-free/. Online
2. Akgul, O., Bai, W., Das, S., & Mazurek, M.L. (2021). Evaluating in-workflow messages for improving mental models of end-to-end encryption. In Proceedings of USENIX Security Symposium (2021)
3. Antonopoulos, P., Arasu, A., Singh, K.D., Eguro, K., Gupta, N., Jain, R., Kaushik, R., Kodavalla, H., Kossmann, D., Ogg, N., et al. (2020). Azure sql database always encrypted. In Proceedings of ACM SIGMOD
4. Arm (2022) Arm confidential compute architecture. https://www.arm.com/en/architecture/security-features/arm-confidential-compute-architecture
5. Armbrust, M., Xin, R.S., Lian, C., Huai, Y., Liu, D., Bradley, J.K., Meng, X., Kaftan, T., Franklin, M.J., & Ghodsi, A., et al. (2015). Spark sql: relational data processing in spark. In Proceedings of ACM SIGMOD