1. An implementable scheme for Secure Delegation of Computing and Data;J.;ICICS,1997
2. Privacy reserving mining of association rules;A.,2002
3. Balancing Confidentiality and efficiency in untrusted relational DBMSs;Damiani,2003
4. Executing SQL over Encrypted Data in the Database Service Provider Model;Hacigumus,2002
5. Efficient Execution of Aggregation Queries over Encypted Relational Databases;Hacigumus,2004