1. Chor B, Goldreich O, Kushilevitz E, Sudan M. Private information retrieval. In: Proceedings of Symposium on Foundations of Computer Science; 1995.
2. Islam M, Kuzu M, Kantarcioglu M. Access pattern disclosure on searchable encryption: ramification, attack and mitigation. In: Network and Distributed System Security Symposium (NDSS), USA; 2012.
3. Goldreich O, Ostrovsky R. Software protection and simulation on oblivious rams. J ACM. 1996.
4. Devanbu P, Gertz M, Martel C, Stubblebine SG. Authentic third-party data publication. In: Proceedings of 14th Annual IFIP WG 11.3 Working conference on Database Security; 2000.
5. Tang T, Liu L, Wang T, Hu X, Sailer R, Pietzuch P. Outsourcing multi-version key-value stores with verifiable data freshness. In: Proceedings of IEEE 30th International Conference on Data Engineering (ICDE), Chicago; 2014.