• Azogagh S, Delfour V, Gambs S and Killijian M. PROBONITE. Proceedings of the 10th Workshop on Encrypted Computing & Applied Homomorphic Cryptography. (23-33).

    https://doi.org/10.1145/3560827.3563377

  • Hoang T, Behnia R, Jang Y and Yavuz A. MOSE. Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy. (17-28).

    https://doi.org/10.1145/3374664.3375749

  • Waye L, Buiras P, Arden O, Russo A and Chong S. Cryptographically Secure Information Flow Control on Key-Value Stores. Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. (1893-1907).

    https://doi.org/10.1145/3133956.3134036

  • San I, At N, Yakut I and Polat H. (2016). Efficient paillier cryptoprocessor for privacy-preserving data mining. Security and Communication Networks. 9:11. (1535-1546). Online publication date: 25-Jul-2016.

    https://doi.org/10.1002/sec.1442

  • Gupta T, Crooks N, Mulhern W, Setty S, Alvisi L and Walfish M. Scalable and private media consumption with Popcorn. Proceedings of the 13th Usenix Conference on Networked Systems Design and Implementation. (91-107).

    /doi/10.5555/2930611.2930618

  • Stefanov E and Shi E. Multi-cloud oblivious storage. Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. (247-258).

    https://doi.org/10.1145/2508859.2516673

  • Stefanov E, van Dijk M, Shi E, Fletcher C, Ren L, Yu X and Devadas S. Path ORAM. Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. (299-310).

    https://doi.org/10.1145/2508859.2516660

  • Lorch J, Parno B, Mickens J, Raykova M and Schiffman J. Shroud. Proceedings of the 11th USENIX conference on File and Storage Technologies. (199-214).

    /doi/10.5555/2591272.2591294

  • Williams P and Sion R. Single round access privacy on outsourced storage. Proceedings of the 2012 ACM conference on Computer and communications security. (293-304).

    https://doi.org/10.1145/2382196.2382229

  • Bajaj S and Sion R. TrustedDB. Proceedings of the 2011 ACM SIGMOD International Conference on Management of data. (205-216).

    https://doi.org/10.1145/1989323.1989346

  • Khoshgozaran A and Shahabi C. (2010). A taxonomy of approaches to preserve location privacy in location-based services. International Journal of Computational Science and Engineering. 5:2. (86-96). Online publication date: 1-Nov-2010.

    /doi/10.5555/1883649.1883650

  • Iliev A and Smith S. Small, stupid, and scalable. Proceedings of the fifth ACM workshop on Scalable trusted computing. (41-52).

    https://doi.org/10.1145/1867635.1867643

  • Tang M and Fidge C. Reconstruction of falsified computer logs for digital forensics investigations. Proceedings of the Eighth Australasian Conference on Information Security - Volume 105. (12-21).

    /doi/10.5555/1862266.1862271

  • Wang P, Wang H and Pieprzyk J. Secure coprocessor-based private information retrieval without periodical preprocessing. Proceedings of the Eighth Australasian Conference on Information Security - Volume 105. (5-11).

    /doi/10.5555/1862266.1862270

  • Yang Y, Ding X, Deng R and Bao F. An Efficient PIR Construction Using Trusted Hardware. Proceedings of the 11th international conference on Information Security. (64-79).

    https://doi.org/10.1007/978-3-540-85886-7_5

  • Dang T. (2008). Ensuring Correctness, Completeness, and Freshness for Outsourced Tree-Indexed Data. Information Resources Management Journal. 21:1. (59-76). Online publication date: 1-Jan-2008.

    https://doi.org/10.4018/irmj.2008010104

  • Lin P and Candan K. (2007). Enabling access-privacy for random walk based data analysis applications. Data & Knowledge Engineering. 63:3. (667-683). Online publication date: 1-Dec-2007.

    https://doi.org/10.1016/j.datak.2007.03.011

  • Yang Y, Li Y and Deng R. New paradigm of inference control with trusted computing. Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security. (243-258).

    /doi/10.5555/1770560.1770585

  • Wang S, Ding X, Deng R and Bao F. Private information retrieval using trusted hardware. Proceedings of the 11th European conference on Research in Computer Security. (49-64).

    /doi/10.5555/2163273.2163277

  • Dang T. Privacy-Preserving search and updates for outsourced tree-structured data on untrusted servers. Proceedings of the Third international conference on Trust Management. (338-354).

    https://doi.org/10.1007/11429760_23

  • Iliev A and Smith S. (2005). Protecting Client Privacy with Trusted Computing at the Server. IEEE Security and Privacy. 3:2. (20-28). Online publication date: 1-Mar-2005.

    https://doi.org/10.1109/MSP.2005.49

  • Smith S. (2004). Outbound authentication for programmable secure coprocessors. International Journal of Information Security. 3:1. (28-41). Online publication date: 1-Oct-2004.

    https://doi.org/10.1007/s10207-004-0033-0

  • Aïmeur E, Brassard G and Mani Onana F. Blind sales in electronic commerce. Proceedings of the 6th international conference on Electronic commerce. (148-157).

    https://doi.org/10.1145/1052220.1052239

  • Garfinkel T, Pfaff B, Chow J, Rosenblum M and Boneh D. (2003). Terra. ACM SIGOPS Operating Systems Review. 37:5. (193-206). Online publication date: 1-Dec-2003.

    https://doi.org/10.1145/1165389.945464

  • Garfinkel T, Pfaff B, Chow J, Rosenblum M and Boneh D. Terra. Proceedings of the nineteenth ACM symposium on Operating systems principles. (193-206).

    https://doi.org/10.1145/945445.945464

  • Asonov D and Freytag J. Repudiative information retrieval. Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society. (32-40).

    https://doi.org/10.1145/644527.644531

  • Smith S. Outbound Authentication for Programmable Secure Coprocessors. Proceedings of the 7th European Symposium on Research in Computer Security. (72-89).

    /doi/10.5555/646649.699490

  • Kesdogan D, Borning M and Schmeink M. Unobservable surfing on the world wide web. Proceedings of the 2nd international conference on Privacy enhancing technologies. (224-238).

    /doi/10.5555/1765299.1765316

  • Asonov D and Freytag J. Almost optimal private information retrieval. Proceedings of the 2nd international conference on Privacy enhancing technologies. (209-223).

    /doi/10.5555/1765299.1765315

  • Iliev A and Smith S. Prototyping an armored data vault rights management on Big Brother's computer. Proceedings of the 2nd international conference on Privacy enhancing technologies. (144-159).

    /doi/10.5555/1765299.1765310

  • Lindemann M and Smith S. Improving DES coprocessor throughput for short operations. Proceedings of the 10th conference on USENIX Security Symposium - Volume 10.

    /doi/10.5555/1251327.1251333

  • Smith S. (2001). WebALPS. ACM SIGecom Exchanges. 2:3. (29-36). Online publication date: 1-Jun-2001.

    https://doi.org/10.1145/844324.844329