R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, Order-preserving encryption for numeric data, Proc. of ACM SIGMOD, pp.563-574, 2004.
DOI : 10.1145/1007568.1007632

URL : http://rakesh.agrawal-family.com/papers/sigmod04opes.pdf

E. Cho, S. A. Myers, and J. Leskovec, Friendship and mobility: User movement in location-based social networks, Proc. of ACM SIGKDD, pp.1082-1090, 2011.

G. Cormode, C. M. Procopiuc, D. Srivastava, E. Shen, and T. Yu, Differentially private spatial decompositions, ICDE, pp.20-31, 2012.
DOI : 10.1109/icde.2012.16

URL : http://arxiv.org/pdf/1103.5170

I. Demertzis, S. Papadopoulos, O. Papapetrou, A. Deligiannakis, and M. N. Garofalakis, Practical private range search revisited, Proc. of SIGMOD, pp.185-198, 2016.
DOI : 10.1145/2882903.2882911

URL : http://infoscience.epfl.ch/record/255110/files/SIGMOD16_RSSE.pdf

C. Dwork, Differential privacy, ICALP, pp.1-12, 2006.

C. Dwork, F. Mcsherry, K. Nissim, and A. Smith, Calibrating noise to sensitivity in private data analysis, TCC, pp.265-284, 2006.
DOI : 10.29012/jpc.v7i3.405

URL : https://journalprivacyconfidentiality.org/index.php/jpc/article/download/405/388

C. Dwork and A. Roth, The algorithmic foundations of differential privacy, Found. Trends Theor. Comput. Sci, vol.9, issue.3&#8211, pp.211-407, 2014.
DOI : 10.1561/0400000042

E. Goh, Secure indexes. IACR Cryptology ePrint Archive, p.216, 2003.

O. Goldreich, Basic Applications, The Foundations of Cryptography, vol.2, 2004.

O. Goldreich, Foundations of cryptography: a primer, Found. Trends in Theoretical Computer Science, vol.1, issue.1, pp.1-116, 2005.
DOI : 10.1561/0400000001

H. Hacigümüshacigümüs¸, B. Iyer, C. Li, and S. Mehrotra, Executing sql over encrypted data in the database-service-provider model, Proc. of SIGMOD, pp.216-227, 2002.

M. Hay, V. Rastogi, G. Miklau, and D. Suciu, Boosting the accuracy of differentially private histograms through consistency, PVLDB, vol.3, issue.1, pp.1021-1032, 2010.

R. Li, A. X. Liu, A. L. Wang, and B. Bruhadeshwar, Fast range query processing with strong privacy protection for cloud computing, vol.7, pp.1953-1964, 2014.
DOI : 10.14778/2733085.2733100

F. D. Mcsherry, Privacy integrated queries: An extensible platform for privacy-preserving data analysis, Proc. of ACM SIGMOD, 2009.

I. Mironov, O. Pandey, O. Reingold, and S. Vadhan, Computational Differential Privacy, Proceedings of the 29th Annual International Cryptology Conference on Advances in Cryptology, CRYPTO '09, pp.126-142, 2009.
DOI : 10.1007/978-3-642-03356-8_8

URL : https://link.springer.com/content/pdf/10.1007%2F978-3-642-03356-8_8.pdf

R. A. Popa, C. M. Redfield, N. Zeldovich, and H. Balakrishnan, Cryptdb: Protecting confidentiality with encrypted query processing, Proc. of the ACM SOSP, pp.85-100, 2011.

W. H. Qardaji, W. Yang, and N. Li, Understanding hierarchical methods for differentially private histograms, vol.6, pp.1954-1965, 2013.
DOI : 10.14778/2556549.2556576

URL : http://www.vldb.org/pvldb/vol6/p1954-qardaji.pdf

S. Tu, M. F. Kaashoek, S. Madden, and N. Zeldovich, Processing analytical queries over encrypted data, Proc. of VLDB, pp.289-300, 2013.
DOI : 10.14778/2535573.2488336

URL : http://dspace.mit.edu/bitstream/1721.1/87023/1/tu-monomi-cr-vldb13.pdf

X. Zhang, X. Meng, and R. Chen, Differentially Private Set-Valued Data Release against Incremental Updates, pp.392-406, 2013.
DOI : 10.1007/978-3-642-37487-6_30

URL : http://idke.ruc.edu.cn/publications/2013/Differential Private Set-Valued Data Release aganist Incremental Updates.pdf