Order-preserving encryption for numeric data, Proc. of ACM SIGMOD, pp.563-574, 2004. ,
DOI : 10.1145/1007568.1007632
URL : http://rakesh.agrawal-family.com/papers/sigmod04opes.pdf
Friendship and mobility: User movement in location-based social networks, Proc. of ACM SIGKDD, pp.1082-1090, 2011. ,
Differentially private spatial decompositions, ICDE, pp.20-31, 2012. ,
DOI : 10.1109/icde.2012.16
URL : http://arxiv.org/pdf/1103.5170
Practical private range search revisited, Proc. of SIGMOD, pp.185-198, 2016. ,
DOI : 10.1145/2882903.2882911
URL : http://infoscience.epfl.ch/record/255110/files/SIGMOD16_RSSE.pdf
Differential privacy, ICALP, pp.1-12, 2006. ,
Calibrating noise to sensitivity in private data analysis, TCC, pp.265-284, 2006. ,
DOI : 10.29012/jpc.v7i3.405
URL : https://journalprivacyconfidentiality.org/index.php/jpc/article/download/405/388
The algorithmic foundations of differential privacy, Found. Trends Theor. Comput. Sci, vol.9, issue.3–, pp.211-407, 2014. ,
DOI : 10.1561/0400000042
, Secure indexes. IACR Cryptology ePrint Archive, p.216, 2003.
Basic Applications, The Foundations of Cryptography, vol.2, 2004. ,
Foundations of cryptography: a primer, Found. Trends in Theoretical Computer Science, vol.1, issue.1, pp.1-116, 2005. ,
DOI : 10.1561/0400000001
Executing sql over encrypted data in the database-service-provider model, Proc. of SIGMOD, pp.216-227, 2002. ,
Boosting the accuracy of differentially private histograms through consistency, PVLDB, vol.3, issue.1, pp.1021-1032, 2010. ,
Fast range query processing with strong privacy protection for cloud computing, vol.7, pp.1953-1964, 2014. ,
DOI : 10.14778/2733085.2733100
Privacy integrated queries: An extensible platform for privacy-preserving data analysis, Proc. of ACM SIGMOD, 2009. ,
Computational Differential Privacy, Proceedings of the 29th Annual International Cryptology Conference on Advances in Cryptology, CRYPTO '09, pp.126-142, 2009. ,
DOI : 10.1007/978-3-642-03356-8_8
URL : https://link.springer.com/content/pdf/10.1007%2F978-3-642-03356-8_8.pdf
Cryptdb: Protecting confidentiality with encrypted query processing, Proc. of the ACM SOSP, pp.85-100, 2011. ,
Understanding hierarchical methods for differentially private histograms, vol.6, pp.1954-1965, 2013. ,
DOI : 10.14778/2556549.2556576
URL : http://www.vldb.org/pvldb/vol6/p1954-qardaji.pdf
Processing analytical queries over encrypted data, Proc. of VLDB, pp.289-300, 2013. ,
DOI : 10.14778/2535573.2488336
URL : http://dspace.mit.edu/bitstream/1721.1/87023/1/tu-monomi-cr-vldb13.pdf
Differentially Private Set-Valued Data Release against Incremental Updates, pp.392-406, 2013. ,
DOI : 10.1007/978-3-642-37487-6_30
URL : http://idke.ruc.edu.cn/publications/2013/Differential Private Set-Valued Data Release aganist Incremental Updates.pdf