1. R. Agrawal, J. Kiernan, R. Srikant and Y. Xu, Order preserving encryption for numeric data, in: Proceedings of the ACM International Conference on Management of Data, SIGMOD, 2004.
2. I. Anati, S. Gueron, S.P. Johnson and V.R. Scarlata, Innovative technology for CPU based attestation and sealing, in: Workshop on Hardware and Architectural Support for Security and Privacy, HASP, 2013.
3. S. Bajaj and R. Sion, TrustedDB: A trusted hardware-based database with privacy and data confidentiality, IEEE Transactions on Information Forensics and Security (2014).
4. A. Baumann, M. Peinado and G. Hunt, Shielding applications from an untrusted cloud with haven, in: Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation, OSDI, 2014.
5. M. Bellare, A. Boldyreva and A. O’Neill, Deterministic and efficiently searchable encryption, in: Proceedings of the 27th International Conference on Advances in Cryptology, CRYPTO, 2007.