1. Aggarwal, G., Bawa, M., Ganesan, P., Garcia-molina, H., Kenthapadi, K., Motwani, R., Srivastava, U., Thomas, D., Xu, Y.: Two can keep a secret: A distributed architecture for secure database services. In: Proc. of the CIDR (2005)
2. Ahituv, N., Lapid, Y., Neumann, S.: Processing encrypted data. Commun. ACM 30(9), 777–780 (1987)
3. Alfred, B., Melissa, Z.: Database Security. Delmar Cengage Learning (2011)
4. Arvind, A., Spyros, B., Ken, E., Manas, J., Raghav, K., Donald, K., Ravi, R., Prasang, U.: Secure database-as-a-service with cipherbase. In: Proc. of the SIGMOD (2013)
5. Ashwini, M.D., Mangesh, S.D., Devendra, N.K.: Fpga implementation of aes encryption and decryption. In: Proc. of the 2009 International Conference on Control, Automation, Communication and Energy Conservation (2009)