1. [1] N. Yuhanna, “The forrester wave: Database encryption solutions, Q3 2005, ” Forrester, Aug. 2005.
2. [2] G. Bebek, “Anti-tamper database research: Inference control techniques, ” Technical Report EECS 433 Final Report, Case Western Reserve University, Nov. 2002.
3. [3] S.C.G. Ozsoyglu and D. Singer, “Anti-tamper database: Querying encrypted databases, ” Proc. 17th Annual IFIP WG 11.3 Working Conference on Database and Applications Security, Estes Park, Colorado, Aug. 2003.
4. [4] R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, “Order preserving encryption for numeric data, ” Proc. ACM SIGMOD 2004, ACM, Paris, France, 2004.
5. [5] T. Ge and S. Zdongik, “Fast, secure encryption for indexing in a column-oriented DBMS, ” ICDE 2007, 2007.