-
4
-
-
20344390544
-
Gemss: Grid-infrastructure for medical service provision
-
Benkner, S., Berti, G., Engelbrecht, G., Fingberg, J., Kohring, G., Middleton, S., Schmidt, R.: Gemss: grid-infrastructure for medical service provision. Methods of Information in Medicine 44, 177-181 (2005)
-
(2005)
Methods of Information in Medicine
, vol.44
, pp. 177-181
-
-
Benkner, S.1
Berti, G.2
Engelbrecht, G.3
Fingberg, J.4
Kohring, G.5
Middleton, S.6
Schmidt, R.7
-
6
-
-
0037986737
-
-
Barbour, V.: UK Biobank: a project in search of a protocol? Lancet 361, 1734-1738 (2003)
-
Barbour, V.: UK Biobank: a project in search of a protocol? Lancet 361, 1734-1738 (2003)
-
-
-
-
7
-
-
51749089052
-
A cryptographic approach to securely share and query genomic sequences
-
in press
-
Kantarcioglu, M., Jiang, W., Liu, Y., Malin, B.: A cryptographic approach to securely share and query genomic sequences. IEEE Transactions on Information Technology in Biomedicine (in press. 2008)
-
(2008)
IEEE Transactions on Information Technology in Biomedicine
-
-
Kantarcioglu, M.1
Jiang, W.2
Liu, Y.3
Malin, B.4
-
8
-
-
2942522665
-
How (not) to protect genomic data privacy in a distributed network: Using trail re-identification to evaluate and design anonymity protection systems
-
Malin, B., Sweeney, L.: How (not) to protect genomic data privacy in a distributed network: using trail re-identification to evaluate and design anonymity protection systems. Journal of Biomedical Informatics 37, 179-192
-
Journal of Biomedical Informatics
, vol.37
, pp. 179-192
-
-
Malin, B.1
Sweeney, L.2
-
9
-
-
56749172689
-
A new medical worry: Identity thieves find ways to target hospital patients
-
Helliker, K.: A new medical worry: identity thieves find ways to target hospital patients. Wall Street Journal (2005)
-
(2005)
Wall Street Journal
-
-
Helliker, K.1
-
10
-
-
77957872604
-
-
Quantin, C., Allaert, F., Avillach, P., Fassa, M., Riandey, B., Trouessin, G., Cohen, O.: Building application-related patient identifiers: what solution for a european country? Int. J. Telemed Appl., 678302 (2008)
-
Quantin, C., Allaert, F., Avillach, P., Fassa, M., Riandey, B., Trouessin, G., Cohen, O.: Building application-related patient identifiers: what solution for a european country? Int. J. Telemed Appl., 678302 (2008)
-
-
-
-
11
-
-
0036371278
-
Analysis of identifier performance using a deterministic linkage algorithm
-
Grannis, S., Overhage, J., McDonald, C.: Analysis of identifier performance using a deterministic linkage algorithm. In: Proceedings of the 2002 American Medical Informatics Annual Fall Symposium, pp. 305-309 (2002)
-
(2002)
Proceedings of the 2002 American Medical Informatics Annual Fall Symposium
, pp. 305-309
-
-
Grannis, S.1
Overhage, J.2
McDonald, C.3
-
12
-
-
1542374034
-
Zero-check: A zero-knowledge protocol for reconciling patient identities across institutions
-
Berman, J.: Zero-check: a zero-knowledge protocol for reconciling patient identities across institutions. Archives of Pathology and Laboratory Medicine 128, 344-346 (2004)
-
(2004)
Archives of Pathology and Laboratory Medicine
, vol.128
, pp. 344-346
-
-
Berman, J.1
-
15
-
-
34748816024
-
Privacy-preserving data integration and sharing
-
Clifton, C., Kantarcioglu, M., Foan, A., Schadow, G., Vaidya, J., Elmagarmid, A.: Privacy-preserving data integration and sharing. In: Proc. of the 9th ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery (2004)
-
(2004)
Proc. of the 9th ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery
-
-
Clifton, C.1
Kantarcioglu, M.2
Foan, A.3
Schadow, G.4
Vaidya, J.5
Elmagarmid, A.6
-
16
-
-
84990975367
-
Private-iye: A framework for privacy preserving data integration
-
IEEE Computer Society, Los Alamitos
-
Bhowmick, S., Gruenwald, L., Iwaihara, M., Chatvichienchai, S.: Private-iye: A framework for privacy preserving data integration. In: Proceedings of the 22nd International Conference on Data Engineering Workshops (ICDEW 2006). IEEE Computer Society, Los Alamitos (2006)
-
(2006)
Proceedings of the 22nd International Conference on Data Engineering Workshops (ICDEW
-
-
Bhowmick, S.1
Gruenwald, L.2
Iwaihara, M.3
Chatvichienchai, S.4
-
17
-
-
35448932873
-
Privacy preserving schema and data matching
-
Scannapieco, M., Figotin, I., Bertino, E., Elmagarmid, A.: Privacy preserving schema and data matching. In: Proceedings of the 2007 ACM SIGMOD International Conference on Management of Data (2007)
-
(2007)
Proceedings of the 2007 ACM SIGMOD International Conference on Management of Data
-
-
Scannapieco, M.1
Figotin, I.2
Bertino, E.3
Elmagarmid, A.4
-
18
-
-
56749112460
-
Sovereign joins
-
IEEE Computer Society, Washington
-
Agra,wal, R., Asonov, D., Kantarcioglu, M., Li, Y.: Sovereign joins. In: ICDE 2006: Proceedings of the 22nd International Conference on Data Engineering (ICDE 2006). IEEE Computer Society, Washington (2006)
-
(2006)
ICDE 2006: Proceedings of the 22nd International Conference on Data Engineering (ICDE
-
-
Agra1
wal, R.2
Asonov, D.3
Kantarcioglu, M.4
Li, Y.5
-
19
-
-
33745160750
-
Privacy preserving set operations
-
Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
-
Kissner, L., Song, D.: Privacy preserving set operations. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 241-257. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3621
, pp. 241-257
-
-
Kissner, L.1
Song, D.2
-
20
-
-
12244263240
-
Efficient private matching and set intersection
-
Interlaken, Switzerland, International Association for Cryptologic Research IACR
-
Freedman, M.J., Nissim, K., Pinkas, B,: Efficient private matching and set intersection. In: Eurocrypt 2004, Interlaken, Switzerland, International Association for Cryptologic Research (IACR) (2004)
-
(2004)
Eurocrypt 2004
-
-
Freedman, M.J.1
Nissim, K.2
Pinkas, B.3
-
21
-
-
33749610153
-
Privacy preserving query processing using third parties
-
Atlanta, GA
-
Emekci, F., Agrawal, D., El Abbadi, A., Gulbeden, A.: Privacy preserving query processing using third parties. In: Proceedings of ICDE 2006, Atlanta, GA (2006)
-
(2006)
Proceedings of ICDE
-
-
Emekci, F.1
Agrawal, D.2
El Abbadi, A.3
Gulbeden, A.4
-
22
-
-
26444477030
-
Performance-oriented privacy-preserving data integration
-
Springer, Heidelberg
-
Pon, R., Critchlow, T.: Performance-oriented privacy-preserving data integration. In: Data Integration in the Life Sciences, pp. 240-256. Springer, Heidelberg (2005)
-
(2005)
Data Integration in the Life Sciences
, pp. 240-256
-
-
Pon, R.1
Critchlow, T.2
-
23
-
-
52649087713
-
A hybrid approach to private record linkage
-
Inan, A., Kantarcioglu, M., Bertino, E., Scannapieco, M.: A hybrid approach to private record linkage. In: Proceedings of the 24th Int'l Conf. on Data Engineering - ICDE 2008 (2008)
-
(2008)
Proceedings of the 24th Int'l Conf. on Data Engineering - ICDE
-
-
Inan, A.1
Kantarcioglu, M.2
Bertino, E.3
Scannapieco, M.4
-
24
-
-
26444497804
-
General Cryptographic Protocols
-
Cambridge University Press, Cambridge
-
Goldreich, O.: General Cryptographic Protocols. In: The Foundations of Cryptography, vol. 2. Cambridge University Press, Cambridge (2004)
-
(2004)
The Foundations of Cryptography
, vol.2
-
-
Goldreich, O.1
-
27
-
-
84861257829
-
-
IBM: IBM PCI cryptographic coprocessor (2004), http://www.ibm.com/ security/cryptocards/html/pcicc.shtml
-
(2004)
PCI cryptographic coprocessor
-
-
-
28
-
-
84942550998
-
Public key cryptosystems based on composite degree residuosity classes
-
Stern, J, ed, EUROCRYPT 1999, Springer, Heidelberg
-
Paillier, P.: Public key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223-238. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
|