1. Kim, H.S.: Privacy preserving security framework for cognitive radio networks. IETE Tech. Rev. 30(2), 142–148 (2014)
2. Manyika, J., Chui, M., Brown, B., Bughin, J., Dobbs, R., Roxburgh, C., Byers, A.H.: Big Data: The Next Frontier for Innovation, Competition, and Productivity. McKinsey Global Institute (2011)
3. Liu, A., et al.: Efficient secure similarity computation on encrypted trajectory data. In: 2015 IEEE 31st International Conference on Data Engineering (ICDE). 2015 IEEE 31st International Conference on Data Engineering (ICDE), pp. 66–77 (2015)
4. Chu, Y.-W., et al.: Privacy-preserving SimRank over distributed information network. In: 2012 IEEE 12th International Conference on Data Mining (ICDM), pp. 840–845 (2012)
5. Bender, G., et al.: Explainable security for relational databases. In: Proceedings of the 2014 ACM SIGMOD International Conference on Management of Data. SIGMOD ’14, pp. 1411–1422. ACM, New York, USA 2014