-
1
-
-
1642327704
-
Secure and private sequence comparisons
-
Atallah, M., Kerschbaum, F., Du, W.: Secure and private sequence comparisons. In: WPES, pp. 39-44 (2003)
-
(2003)
WPES
, pp. 39-44
-
-
Atallah, M.1
Kerschbaum, F.2
Du, W.3
-
2
-
-
50249177701
-
Towards practical privacy for genomic computation
-
Jha, S., Kruger, L., Shmatikov, V.: Towards practical privacy for genomic computation. In: IEEE Symposium on Security and Privacy, pp. 216-230 (2008)
-
(2008)
IEEE Symposium on Security and Privacy
, pp. 216-230
-
-
Jha, S.1
Kruger, L.2
Shmatikov, V.3
-
3
-
-
57049083569
-
Privacy preserving error resilient DNA searching through oblivious automata
-
Troncoso-Pastoriza, J., Katzenbeisser, S., Celik, M.: Privacy preserving error resilient DNA searching through oblivious automata. In: ACM CCS, pp. 519-528 (2007)
-
(2007)
ACM CCS
, pp. 519-528
-
-
Troncoso-Pastoriza, J.1
Katzenbeisser, S.2
Celik, M.3
-
4
-
-
70350370031
-
Practical private DNA string searching and matching through efficient oblivious automata evaluation
-
Frikken, K.: Practical private DNA string searching and matching through efficient oblivious automata evaluation. In: DBSec, pp. 81-94 (2009)
-
(2009)
DBSec
, pp. 81-94
-
-
Frikken, K.1
-
5
-
-
77958496068
-
Privacy-preserving matching of DNA profiles
-
Bruekers, F., Katzenbeisser, S., Kursawe, K., Tuyls, P.: Privacy-preserving matching of DNA profiles. ePrint Cryptology Archive Report 2008/203 (2008)
-
(2008)
EPrint Cryptology Archive Report 2008/203
-
-
Bruekers, F.1
Katzenbeisser, S.2
Kursawe, K.3
Tuyls, P.4
-
6
-
-
74049087814
-
Privacy-preserving genomic computation through program specialization
-
Wang, R., Wang, X., Li, Z., Tang, H., Reiter, M., Dong, Z.: Privacy-preserving genomic computation through program specialization. In: ACM CCS, pp. 338-347 (2009)
-
(2009)
ACM CCS
, pp. 338-347
-
-
Wang, R.1
Wang, X.2
Li, Z.3
Tang, H.4
Reiter, M.5
Dong, Z.6
-
7
-
-
24344475303
-
Secure outsourcing of sequence comparisons
-
Privacy Enhancing Technologies - 4th International Workshop, PET 2004
-
Atallah, M., Li, J.: Secure outsourcing of sequence comparisons. In: PET, pp. 63-78 (2004) (Pubitemid 41251997)
-
(2005)
Lecture Notes in Computer Science
, vol.3424
, pp. 63-78
-
-
Atallah, M.J.1
Li, J.2
-
8
-
-
27644520949
-
Secure outsourcing of sequence comparisons
-
DOI 10.1007/s10207-005-0070-3
-
Atallah, M., Li, J.: Secure outsourcing of sequence comparisons. International Journal of Information Security 4(4), 277-287 (2005) (Pubitemid 41554602)
-
(2005)
International Journal of Information Security
, vol.4
, Issue.4
, pp. 277-287
-
-
Atallah, M.J.1
Li, J.2
-
9
-
-
77958509672
-
-
Genetic Testing for Health, Disease & Ancestry; DNA Test - 23 and Me
-
Genetic Testing for Health, Disease & Ancestry; DNA Test - 23 and Me, http://www.23andme.com
-
-
-
-
10
-
-
77958487669
-
Secure outsourcing of DNA searching via finite automata
-
University of Notre Dame
-
Blanton, M., Aliasgari, M.: Secure outsourcing of DNA searching via finite automata. Technical Report 2010-03, University of Notre Dame (2010)
-
(2010)
Technical Report 2010-03
-
-
Blanton, M.1
Aliasgari, M.2
-
11
-
-
85129493630
-
Toward a practical data privacy scheme for a distributed implementation of the Smith-Waterman genome sequence comparison algorithm
-
Szajda, D., Pohl, M., Owen, J., Lawson, B.: Toward a practical data privacy scheme for a distributed implementation of the Smith-Waterman genome sequence comparison algorithm. In: NDSS (2006)
-
(2006)
NDSS
-
-
Szajda, D.1
Pohl, M.2
Owen, J.3
Lawson, B.4
-
12
-
-
51749089052
-
A cryptographic approach to securely share and query genomic sequences
-
Kantarcioglu, M., Jiang, W., Liu, Y., Malin, B.: A cryptographic approach to securely share and query genomic sequences. IEEE Transactions on Information Technology in Biomedicine 12(5), 606-617 (2008)
-
(2008)
IEEE Transactions on Information Technology in Biomedicine
, vol.12
, Issue.5
, pp. 606-617
-
-
Kantarcioglu, M.1
Jiang, W.2
Liu, Y.3
Malin, B.4
-
13
-
-
67650155437
-
Communication-efficient private protocols for longest common subsequence
-
Franklin, M., Gondree, M., Mohassel, P.: Communication-efficient private protocols for longest common subsequence. In: RSA, pp. 265-278 (2009)
-
(2009)
RSA
, pp. 265-278
-
-
Franklin, M.1
Gondree, M.2
Mohassel, P.3
-
14
-
-
74049117851
-
Longest common subsequence as private search
-
Gondree, M., Mohassel, P.: Longest common subsequence as private search. In: WPES, pp. 81-90 (2009)
-
(2009)
WPES
, pp. 81-90
-
-
Gondree, M.1
Mohassel, P.2
-
15
-
-
64049119146
-
Efficient oblivious transfer protocols
-
Naor, M., Pinkas, B.: Efficient oblivious transfer protocols. In: SODA, pp. 448-457 (2001)
-
(2001)
SODA
, pp. 448-457
-
-
Naor, M.1
Pinkas, B.2
-
16
-
-
33645970169
-
An oblivious transfer protocol with log-squared communication
-
Zhou, J., López, J., Deng, R. H., Bao, F. eds., Springer, Heidelberg, ISC 2005
-
Lipmaa, H.: An oblivious transfer protocol with log-squared communication. In: Zhou, J., López, J., Deng, R. H., Bao, F. (eds.) ISC 2005. LNCS, vol. 3650, pp. 314-328. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3650
, pp. 314-328
-
-
Lipmaa, H.1
-
17
-
-
26444512068
-
Single-database private information retrieval with constant communication rate
-
Gentry, C., Ramzan, Z.: Single-database private information retrieval with constant communication rate. In: ICALP, pp. 803-815 (2005)
-
(2005)
ICALP
, pp. 803-815
-
-
Gentry, C.1
Ramzan, Z.2
-
18
-
-
0003147279
-
Oblivious transfer and polynomial evaluation
-
Naor, M., Pinkas, B.: Oblivious transfer and polynomial evaluation. In: STOC (1999)
-
(1999)
STOC
-
-
Naor, M.1
Pinkas, B.2
-
19
-
-
80051636706
-
Single database private information retrieval implies oblivious transfer
-
Preneel, B. ed., Springer, Heidelberg, EUROCRYPT 2000
-
Crescenzo, G., Malkin, T., Ostrovsky, R.: Single database private information retrieval implies oblivious transfer. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 122-138. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1807
, pp. 122-138
-
-
Crescenzo, G.1
Malkin, T.2
Ostrovsky, R.3
-
20
-
-
1642602228
-
Computationally private information retrieval with polylogarithmic communication
-
Stern, J. ed., Springer, Heidelberg, EUROCRYPT 1999
-
Cachin, C., Micali, S., Stadler, M.: Computationally private information retrieval with polylogarithmic communication. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 402-414. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1592
, pp. 402-414
-
-
Cachin, C.1
Micali, S.2
Stadler, M.3
-
21
-
-
0031378815
-
Replication is not needed: Single database, computationally-private information retrieval
-
Kushilevitz, E., Ostrovsky, R.: Replication is not needed: Single database, computationally-private information retrieval. In: IEEE FOCS, pp. 364-373 (1997)
-
(1997)
IEEE FOCS
, pp. 364-373
-
-
Kushilevitz, E.1
Ostrovsky, R.2
-
22
-
-
77958470354
-
Single-database private information retrieval schemes: Overview, performance study, and usage with statistical databases
-
Melchor, C. A., Deswarte, Y.: Single-database private information retrieval schemes: Overview, performance study, and usage with statistical databases. In: Privacy in Statistical Databases, pp. 257-265 (2006)
-
(2006)
Privacy in Statistical Databases
, pp. 257-265
-
-
Melchor, C.A.1
Deswarte, Y.2
-
23
-
-
84921020129
-
A lattice-based computationally-efficient private information retrieval protocol
-
Aguilar-Melchor, C., Gaborit, P.: A lattice-based computationally- efficient private information retrieval protocol. In: WEWORC (2007)
-
(2007)
WEWORC
-
-
Aguilar-Melchor, C.1
Gaborit, P.2
-
26
-
-
55849130742
-
High-speed private information retrieval computation on GPU
-
Melchor, C., Crespin, B., Gaborit, P., Jolivet, V.: High-speed private information retrieval computation on GPU. In: IEEE SECURWARE (2008)
-
(2008)
IEEE SECURWARE
-
-
Melchor, C.1
Crespin, B.2
Gaborit, P.3
Jolivet, V.4
-
27
-
-
0023545076
-
How to play any mental game
-
Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game. In: STOC, pp. 218-229 (1987)
-
(1987)
STOC
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
28
-
-
0000731055
-
Security and composition of multiparty cryptographic protocols
-
Canetti, R.: Security and composition of multiparty cryptographic protocols. Journal of Cryptology 13(1), 143-202 (2000)
-
(2000)
Journal of Cryptology
, vol.13
, Issue.1
, pp. 143-202
-
-
Canetti, R.1
|