Order preserving encryption for numeric data, International Conference on Management of Data (SIGMOD, pp.563-574, 2004. ,
Best position algorithms for top-k queries, Proceedings of the VLDB Endowment, pp.495-506, 2007. ,
URL : https://hal.archives-ouvertes.fr/inria-00378836
Scalable, efficient range queries for grid information services, International Conference on Peer-to-Peer Computing, pp.33-40, 2002. ,
, Handbook of Research on P2P and Grid Systems for Service-Oriented Computing: Models, Methodologies and Applications: Models, Methodologies and Applications. Information Science Reference (an imprint of IGI Global), 2010.
Security against covert adversaries: Efficient protocols for realistic adversaries, Theory of Cryptography Conference (TCC, pp.137-156, 2007. ,
Sorting and searching behind the curtain, International Conference on Financial Cryptography and Data Security (FC) (2015), pp.127-146 ,
Order-preserving symmetric encryption, International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT, pp.224-241, 2009. ,
Conjunctive, subset, and range queries on encrypted data, Theory of Cryptography Conference (TCC, pp.535-554, 2007. ,
The skyline operator, International Conference on Data Engineering (ICDE), vol.5, pp.421-430, 2001. ,
Machine learning classification over encrypted data, Network and Distributed System Security Symposium (NDSS, 2015. ,
leveled) fully homomorphic encryption without bootstrapping, Transactions on Computation Theory Journal (TOCT), vol.6, p.13, 2014. ,
Evaluating top-k queries over webaccessible databases, International Conference on Data Engineering (ICDE, pp.369-380, 2002. ,
Fast privacy-preserving top-k queries using secret sharing, International Conference on Computer Communications and Networks (ICCCN) (2010), pp.1-7 ,
Efficient top-k query calculation in distributed networks, ACM Symposium on Principles of Distributed Computing (PODC), pp.206-215, 2004. ,
Efficient top-k query calculation in distributed networks, ACM Symposium on Principles of Distributed Computing Conference (PODC), pp.206-215, 2004. ,
Privacy preserving keyword searches on remote encrypted data, International Conference on Applied Cryptography and Network Security (ACNS) (2005), pp.442-455 ,
, , 2002.
Crowdsourcing for top-k query processing over uncertain data, Transactions on Knowledge and Data Engineering Journal (TKDE), vol.28, pp.41-53, 2016. ,
Cloud adoption practices and priorities survey report, 2015. ,
Searchable symmetric encryption: improved definitions and efficient constructions, Journal of Computer Security (JCS), vol.19, pp.895-934, 2011. ,
A provably secure additive and multiplicative privacy homomorphism, International Conference on Information Security (ISC, pp.471-483, 2002. ,
Calibrating noise to sensitivity in private data analysis, Theory of Cryptography Conference (TCC, pp.265-284, 2006. ,
The algorithmic foundations of differential privacy, Foundations and Trends R in Theoretical Computer Science Journal, vol.9, pp.211-407, 2014. ,
Secure k-nearest neighbor query over encrypted data in outsourced environments, International Conference on Data Engineering, pp.664-675, 2014. ,
Combining fuzzy information from multiple systems, Journal of Computer and System Sciences, vol.58, pp.83-99, 1999. ,
Optimal aggregation algorithms for middleware, SIGMOD-SIGACT-SIGART symposium on Principles of database systems, pp.102-113, 2001. ,
Optimal aggregation algorithms for middleware, Journal of Computer and System Sciences (JCSS), vol.66, pp.614-656, 2003. ,
Fully homomorphic encryption using ideal lattices, ACM Symposium on Theory of Computing Conference (STOC, pp.169-178, 2009. ,
Private queries in location based services: anonymizers are not necessary, International Conference on Management of Data (SIGMOD), pp.121-132, 2008. ,
Query evaluation techniques for large databases, Computing Surveys Journal (CSUR), vol.25, pp.73-169, 1993. ,
Top-k interesting subgraph discovery in information networks, International Conference on Data Engineering (ICDE), pp.820-831, 2014. ,
Executing sql over encrypted data in the database-service-provider model, International Conference on Management of Data (SIGMOD, pp.216-227, 2002. ,
Providing database as a service, International Conference on Data Engineering (ICDE, pp.29-40, 2002. ,
On the geometry of differential privacy, ACM Symposium on Theory of Computing Conference (STOC) (2010), pp.705-714 ,
Secure multidimensional range queries over outsourced data, VLDB Journal, vol.21, pp.333-358, 2012. ,
A privacy-preserving index for range queries, Proceedings of the VLDB Endowment, pp.720-731, 2004. ,
Processing private queries over untrusted data cloud through privacy homomorphism, International Conference on Data Engineering (ICDE, pp.601-612, 2011. ,
Dynamic searchable symmetric encryption, ACM Conference on Computer and Communications Security (CCS, pp.965-976, 2012. ,
Efficient secure k-nearest neighbours over encrypted data, International Conference on Extending Database Technology (EDBT, pp.264-275, 2018. ,
Voronoi-based k nearest neighbor search for spatial network databases, Proceedings of the VLDB Endowment (PVLDB), pp.840-851, 2004. ,
The state of the art in distributed query processing, Computing Surveys Journal (CSUR), vol.32, pp.422-469, 2000. ,
Differentially private m-estimators, Neural Information Processing Systems Conference (NIPS, pp.361-369, 2011. ,
A data-and workload-aware query answering algorithm for range queries under differential privacy, VLDB Journal, vol.7, pp.341-352, 2014. ,
Efficient range query processing in peer-to-peer systems, Transactions on Knowledge and Data Engineering Journal (TKDE), vol.21, pp.78-91, 2009. ,
Efficiency and security trade-off in supporting range queries on encrypted databases, ACM Conference on Data and Applications Security and Privacy (CODASPY) (2005), pp.69-83 ,
Fast range query processing with strong privacy protection for cloud computing, VLDB Journal, vol.7, pp.1953-1964, 2014. ,
Multi-dimensional range queries in sensor networks, International Conference on Embedded Networked Sensor Systems (SenSys) (2003), pp.63-75 ,
Efficient k nearest neighbor queries on remote spatial databases using range estimation, International Conference on Scientific and Statistical Database Management (SSDBM, pp.121-130, 2002. ,
Programmable order-preserving secure index for encrypted database query, International Conference on Cloud Computing (CLOUD) (2012), pp.502-509 ,
\ell-diversity: Privacy beyond\kappa-anonymity, International Conference on Data Engineering (ICDE, p.24, 2006. ,
Privacy preserving query processing in the cloud, Gestion de données-principes, technologies et applications (BDA) (2016), pp.61-62 ,
URL : https://hal.archives-ouvertes.fr/lirmm-01410395
Answering top-k queries over outsourced sensitive data in the cloud, International Conference on Database and Expert Systems Applications (DEXA) (2018), pp.218-231 ,
URL : https://hal.archives-ouvertes.fr/lirmm-01886164
Distributed privacypreserving top-k query processing, Gestion de données-principes, technologies et applications (BDA), 2018. ,
URL : https://hal.archives-ouvertes.fr/lirmm-01886160
Privacy-preserving topk query processing in distributed systems, European Conference on Parallel Processing, pp.281-292, 2018. ,
URL : https://hal.archives-ouvertes.fr/lirmm-01886160
Top-k query processing over distributed sensitive data, International Database Engineering & Applications Symposium (IDEAS) (2018), pp.208-216 ,
Efficient aggregation of ranked inputs, International Conference on Data Engineering (ICDE, pp.72-72, 2006. ,
A framework for distributed top-k query algorithms, Proceedings of the VLDB Endowment (PVLDB) (2005), pp.637-648 ,
Peersim: A scalable p2p simulator, International Conference on Peer-to-Peer Computing, pp.99-100, 2009. ,
Principles of Distributed Database Systems, 2011. ,
Towards an analysis of range query performance in spatial data structures, SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, pp.214-221, 1993. ,
Public-key cryptosystems based on composite degree residuosity classes, International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), pp.223-238, 1999. ,
An optimal and progressive algorithm for skyline queries, International Conference on Management of data (SIGMOD, pp.467-478, 2003. ,
Query processing in spatial network databases, Proceedings of the VLDB Endowment, pp.802-813, 2003. ,
Distributed evaluation of top-k temporal joins, International Conference on Management of Data, pp.1027-1039, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01266188
Extensible/rule based query rewrite optimization in starburst, Sigmod Record, vol.21, pp.39-48, 1992. ,
Replication, load balancing and efficient range query processing in dhts, International Conference on Extending Database Technology (EDBT, pp.131-148, 2006. ,
An ideal-security protocol for orderpreserving encoding, IEEE Symposium on Security and Privacy (S&P) (2013), pp.463-477 ,
Cryptdb: protecting confidentiality with encrypted query processing, ACM Symposium on Operating Systems Principles (SOSP, pp.85-100, 2011. ,
Interactive privacy via the median mechanism, ACM Symposium on Theory of Computing Conference (STOC) (2010), pp.765-774 ,
A differentially private index for range query processing in clouds, International Conference on Data Engineering (ICDE), 2018. ,
URL : https://hal.archives-ouvertes.fr/lirmm-01886725
Generalizing data to provide anonymity when disclosing information, SIGMOD/PODS Conference, p.188, 1998. ,
Description of a new variable-length key, 64-bit block cipher (blowfish), Fast Software Encryption workshop (FSE), pp.191-204, 1994. ,
Privacy preserving nearest neighbor search, International Conference on Data Mining Workshops (ICDMW, pp.541-545, 2006. ,
Multidimensional range query over encrypted data, IEEE Symposium on Security and Privacy (S&P), pp.350-364, 2007. ,
Top-k relevant semantic place retrieval on spatial RDF data, International Conference on Management of Data (SIGMOD, pp.1977-1990, 2016. ,
A new range query algorithm for universal b-trees, Information Systems Journal (ISJ), vol.31, issue.6, pp.489-511, 2006. ,
Fully homomorphic encryption with relatively small key and ciphertext sizes, International Workshop on Public Key Cryptography (PKC) (2010), pp.420-443 ,
Practical techniques for searches on encrypted data, IEEE Symposium on Security and Privacy, pp.44-55, 2000. ,
Faster fully homomorphic encryption, International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT) (2010), pp.377-394 ,
Ensuring security and privacy preservation for cloud data services, Computing Surveys Journal (CSUR), vol.49, p.13, 2016. ,
Privacy-preserving top-k queries, International Conference on Data Engineering (ICDE) (2005), pp.545-546 ,
Privacy-preserving kth element score over vertically partitioned data, Transactions on Knowledge and Data Engineering Journal (TKDE), vol.21, pp.253-258, 2009. ,
Fully homomorphic encryption over the integers, International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT) (2010), pp.24-43 ,
Computationally efficient searchable symmetric encryption, Secure Data Management Workshop (SDM) (2010), pp.87-100 ,
SKYPE: top-k spatial-keyword publish/subscribe over sliding window, VLDB Journal, vol.9, pp.588-599, 2016. ,
Secure knn computation on encrypted databases, International Conference on Management of Data (SIGMOD, pp.139-152, 2009. ,
Top-k query processing on encrypted databases with strong security guarantees, International Conference on Data Engineering (ICDE, 2018. ,
Security analysis for order preserving encryption schemes, Annual Conference on Information Sciences and Systems (CISS) (2012), pp.1-6 ,
Topk queries across multiple private databases, International Conference on Distributed Computing Systems (ICDCS) (2005), pp.145-154 ,
Prefix-preserving ip address anonymization: Measurement-based security evaluation and a new cryptographybased scheme, International Conference on Network Protocols (ICNP, pp.280-289, 2002. ,
An efficient top-k query processing framework in mobile sensor networks, Data & Knowledge Engineering Journal (DKE), vol.102, pp.78-95, 2016. ,
Secure nearest neighbor revisited, International Conference on Data Engineering (ICDE) (2013), pp.733-744 ,
Efficient processing of distributed top-k queries, International Conference on Database and Expert Systems Applications (DEXA) (2005), pp.65-74 ,
Functional mechanism: regression analysis under differential privacy, VLDB Journal, vol.5, pp.1364-1375, 2012. ,
Crowdsourced top-k algorithms: An experimental evaluation, VLDB Journal, vol.9, pp.612-623, 2016. ,
Secure k-nn computation on encrypted cloud data without sharing key with query users, International Workshop on Security in Cloud Computing (SCC) (2013), pp.55-60 ,