1. Domingo-Ferrer, J., New privacy homomorphism and applications. Inf. Process. Lett. 5(60):277–282, 1994.
2. Easttom, C., Computer security fundamentals. 2nd edn. Upper Saddle River: Prentice Hall, 2011.
3. Grau, S., Allen, T., and Sherkat, N., Silog: Speech input logon. Knowl.-Based Syst. 7(22):535–539, 2009.
4. Hakan, H., Bala, L., and Chen, L., Executing sql over encrypted data in the database service provider model. In: Proceedings of SIGMOD’ 02, pp. 216–227, 2002.
5. Popa, R. A., Redfield, C. M. S., Zeldovich, N., and Balakrishnan, H, CryptDB: Protecting confidentiality with encrypted query processing. In: Proceedings of SOSP’ 11, pp. 85–100, 2011.