1Hacigümüs H,Mehrotra S,Iyer B.Providing database as a service.In:Proc.of the Int'l Conf.on Data Engineering.Washington:IEEE Computer Society Press,2002.29-38.
2Mykletun E,Narasimha M,Tsudik G.Authentication and integrity in outsourced databases.ACM Trans.on Storage,2006,2(2):107-138.
3Schneier B,Wrote; Wu SZ,Zhu SX,Zhang WZ,Trans.Applied Cryptography-Protocols,Algorithms,and Source Code in C (Second Edition).Beijing:China Machine Press,2006 (in Chinese).
4Shmueli E,Waisenberg R,Elovici Y,Gudes E.Designing secure indexes for encrypted databases.In:Proc.of the IFIP Conf.on Database and Applications Security.LNCS 3654,Heidelberg,Berlin:Springer-Verlag,2005.54-68.
5Yang ZQ,Zhong S,Wright RN.Privacy-Preserving queries on encrypted data.In:Proc.of the 11th European Symp.on Research in Computer Security.LNCS 4189,Heidelberg,Berlin:Springer-Verlag,2006.479-495.
6Davida GI,Wells DL,Kam JB.A database encryption system with subkeys.ACM Trans.on Database Systems,1981,6(2):312-328.[doi:10.1145/319566.319580].
7Song DX,Wagner D,Perrig A.Practical techniques for searches on encrypted data.In:Proc.of 2000 IEEE Symp.on Research in Security and Privacy.Washington:IEEE Computer Society Press,2000.44-55.
8Hacigümüs H,Iyer B,Mehrotra S,Li C.Executing SQL over encrypted data in the database service provider model.In:Proc.of the ACM SIGMOD Conf.New York:ACM Press,2002.216-227.
9Ozsoyoglu G,Singer DA,Chung SS.Anti-Tamper databases:Querying encrypted databases.In:Proc.of the 17th Annual IFIP WG 11.3 Working Conf.on Database Applications and Security.Cleveland:Case Western Reserve University,2003.133-146.
10Hore B,Mehrotra S,Tsudik G.A privacy-preserving index for range queries.In:Nascimento MA,-zsu MT,Kossmann D,Miller,Blakeley RJJA,Schiefer KB,eds.Proc.of the 13th Int'l Conf.on Very Large Data Bases.New York:ACM Press,2004.720-731.