1. D.X. Song, D. Wagner, A. Perrig, Practical Techniques for Searches on Encrypted. Data[C]//In Proceedings of the 2000 IEEE Symposium on Security and Privacy (IEEE Press, Berkeley, 2000), pp. 44–55.
2. E.J. Goh, Secure indexes[J]. IACR Cryptology ePrint Archive, 2003 (2003), p. 216.
3. R. Agrawal, J. Kiernan, R. Srikant, et al., Order-preserving encryption for numeric data[C]//Proceedings of the 2004 ACM SIGMOD International Conference on Management of data (ACM, 2004), pp. 563–574.
4. Ted Pedersen.Information content computed on various corpora [EB/OL]. (2013-5-19) [2016-08-15].
http://wn-similarity.sourceforge.net/
.
5. B.H. Bloom, Space/time trade-offs in hash coding with allowable errors[J]. Commun. ACM 13(7), 422–426 (1970).