1. Chor B, Goldreich O, Kushilevitz E, Sudan M. Private information retrieval. In: Proceedings of the 36th Annual Symposium on Foundations of Computer Science; 1995.
2. Islam M, Kuzu M, Kantarcioglu M. Access pattern disclosure on searchable encryption: ramification, attack and mitigation. In: Proceedings of the Network and Distributed Systems Security Symposium; 2012.
3. Goldreich O, Ostrovsky R. Software protection and simulation on oblivious rams. J ACM. 1996;43(3):431–473.
4. Devanbu P, Gertz M, Martel C, Stubblebine SG. Authentic third-party data publication. In: Proceedings of the IFIP TC11/ WG11.3 14th Annual Working Conference on Database Security; 2000.
5. Tang T, Liu L, Wang T, Hu X, Sailer R, Pietzuch P. Outsourcing multi-version key-value stores with verifiable data freshness. In: Proceedings of the IEEE 30th International Conference on Data Engineering; 2014.