P. Cao and Z. Wang, Efficient top-k query calculation in distributed networks, Proc. of ACM PODC, pp.206-215, 2004.

Y. Chang and M. Mitzenmacher, Privacy preserving keyword searches on remote encrypted data, ACNS, pp.442-455, 2005.

S. Choi, G. Ghinita, H. Lim, and E. Bertino, Secure knn query processing in untrusted cloud environments, IEEE TKDE, vol.26, issue.11, pp.2818-2831, 2014.

X. Ding, P. Liu, and H. Jin, Privacy-preserving multi-keyword top-k similarity search over encrypted data, IEEE TDSC, issue.99, pp.1-14, 2017.

Y. Elmehdwi, B. K. Samanthula, and W. Jiang, Secure k-nearest neighbor query over encrypted data in outsourced environments, Proc. of IEEE ICDE, pp.664-675, 2014.

R. Fagin, A. Lotem, and M. Naor, Optimal aggregation algorithms for middleware, J. Comput. Syst. Sci, vol.66, issue.4, pp.614-656, 2003.

B. Hore, S. Mehrotra, M. Canim, and M. Kantarcioglu, Secure multidimensional range queries over outsourced data, J. VLDB, vol.21, issue.3, pp.333-358, 2012.

B. Hore, S. Mehrotra, and G. Tsudik, A privacy-preserving index for range queries, VLDB, pp.720-731, 2004.

H. Kim, H. Kim, and J. Chang, A privacy-preserving top-k query processing algorithm in the cloud computing, Economics of Grids, Clouds, Systems, and Services (GECON), pp.277-292, 2016.

R. Li, A. X. Liu, A. L. Wang, and B. Bruhadeshwar, Fast range query processing with strong privacy protection for cloud computing, vol.7, pp.1953-1964, 2014.

X. Liao and J. Li, Privacy-preserving and secure top-k query in two-tier wireless sensor network, Global Communications Conference (GLOBECOM), pp.335-341, 2012.

A. Raluca, C. M. Popa, N. Redfield, H. Zeldovich, and . Balakrishnan, Cryptdb: processing queries on an encrypted database. Commun, vol.55, pp.103-111, 2012.

D. Song, D. Wagner, and A. Perrig, Practical techniques for searches on encrypted data, IEEE S&P, pp.44-55, 2000.

J. Vaidya and C. Clifton, Privacy-preserving top-k queries, Data Engineering, 2005. ICDE 2005. Proceedings. 21st International Conference on, pp.545-546, 2005.
DOI : 10.1109/icde.2005.112

W. K. Wong, D. Cheung, B. Kao, and N. Mamoulis, Secure knn computation on encrypted databases, ACM SIGMOD, pp.139-152, 2009.
DOI : 10.1145/1559845.1559862

URL : http://www.cs.hku.hk/~dcheung/publication/sigmod2009-1.pdf

X. Haohan-zhu, G. Meng, and . Kollios, Top-k query processing on encrypted databases with strong security guarantees, 2016.