1. Database management as a service: Challenges and opportunities;Agrawal,2009
2. From secrecy to soundness: Efficient verification via secure computation;Applebaum,2010
3. Provable data possession at untrusted stores;Ateniese,2007
4. Verifiable delegation of computation over large datasets;Benabbas,2011
5. Evaluating 2-DNF formulas on ciphertexts;Boneh,2005