1. Rakesh Agrawal, Jerry Kiernan, Ramakrishnan Srikant, and Yirong Xu. 2004. Order Preserving Encryption for Numeric Data. In Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data (SIGMOD '04). ACM, New York, NY, USA, 563--574. https://doi.org/10.1145/1007568.1007632
2. Mário S Alvim, Konstantinos Chatzikokolakis, Annabelle McIver, Carroll Morgan, Catuscia Palamidessi, and Geoffrey Smith. 2019. The Science of Quantitative Information Flow .Springer International Publishing.
3. Mário S Alvim, Kostas Chatzikokolakis, Catuscia Palamidessi, and Geoffrey Smith. 2012. Measuring information leakage using generalized gain functions. In Computer Security Foundations Symposium (CSF), 2012 IEEE 25th. IEEE, 265--279.
4. Vincent Bindschaedler, Paul Grubbs, David Cash, Thomas Ristenpart, and Vitaly Shmatikov. 2018. The Tao of Inference in Privacy-protected Databases. Proc. VLDB Endow., Vol. 11, 11 (July 2018), 1715--1728. https://doi.org/10.14778/3236187.3236217
5. Bitglass. 2014. Bitglass. https://www.bitglass.com/