메뉴 건너뛰기




Volumn 6166 LNCS, Issue , 2010, Pages 49-64

Secure outsourcing of DNA searching via finite automata

Author keywords

[No Author keywords available]

Indexed keywords

ERROR-RESILIENT; GENETIC TESTS; SERVICE PROVIDER;

EID: 77958487669     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-13739-6_4     Document Type: Conference Paper
Times cited : (63)

References (28)
  • 1
    • 1642327704 scopus 로고    scopus 로고
    • Secure and private sequence comparisons
    • Atallah, M., Kerschbaum, F., Du, W.: Secure and private sequence comparisons. In: WPES, pp. 39-44 (2003)
    • (2003) WPES , pp. 39-44
    • Atallah, M.1    Kerschbaum, F.2    Du, W.3
  • 3
    • 57049083569 scopus 로고    scopus 로고
    • Privacy preserving error resilient DNA searching through oblivious automata
    • Troncoso-Pastoriza, J., Katzenbeisser, S., Celik, M.: Privacy preserving error resilient DNA searching through oblivious automata. In: ACM CCS, pp. 519-528 (2007)
    • (2007) ACM CCS , pp. 519-528
    • Troncoso-Pastoriza, J.1    Katzenbeisser, S.2    Celik, M.3
  • 4
    • 70350370031 scopus 로고    scopus 로고
    • Practical private DNA string searching and matching through efficient oblivious automata evaluation
    • Frikken, K.: Practical private DNA string searching and matching through efficient oblivious automata evaluation. In: DBSec, pp. 81-94 (2009)
    • (2009) DBSec , pp. 81-94
    • Frikken, K.1
  • 6
    • 74049087814 scopus 로고    scopus 로고
    • Privacy-preserving genomic computation through program specialization
    • Wang, R., Wang, X., Li, Z., Tang, H., Reiter, M., Dong, Z.: Privacy-preserving genomic computation through program specialization. In: ACM CCS, pp. 338-347 (2009)
    • (2009) ACM CCS , pp. 338-347
    • Wang, R.1    Wang, X.2    Li, Z.3    Tang, H.4    Reiter, M.5    Dong, Z.6
  • 7
    • 24344475303 scopus 로고    scopus 로고
    • Secure outsourcing of sequence comparisons
    • Privacy Enhancing Technologies - 4th International Workshop, PET 2004
    • Atallah, M., Li, J.: Secure outsourcing of sequence comparisons. In: PET, pp. 63-78 (2004) (Pubitemid 41251997)
    • (2005) Lecture Notes in Computer Science , vol.3424 , pp. 63-78
    • Atallah, M.J.1    Li, J.2
  • 8
    • 27644520949 scopus 로고    scopus 로고
    • Secure outsourcing of sequence comparisons
    • DOI 10.1007/s10207-005-0070-3
    • Atallah, M., Li, J.: Secure outsourcing of sequence comparisons. International Journal of Information Security 4(4), 277-287 (2005) (Pubitemid 41554602)
    • (2005) International Journal of Information Security , vol.4 , Issue.4 , pp. 277-287
    • Atallah, M.J.1    Li, J.2
  • 9
    • 77958509672 scopus 로고    scopus 로고
    • Genetic Testing for Health, Disease & Ancestry; DNA Test - 23 and Me
    • Genetic Testing for Health, Disease & Ancestry; DNA Test - 23 and Me, http://www.23andme.com
  • 10
    • 77958487669 scopus 로고    scopus 로고
    • Secure outsourcing of DNA searching via finite automata
    • University of Notre Dame
    • Blanton, M., Aliasgari, M.: Secure outsourcing of DNA searching via finite automata. Technical Report 2010-03, University of Notre Dame (2010)
    • (2010) Technical Report 2010-03
    • Blanton, M.1    Aliasgari, M.2
  • 11
    • 85129493630 scopus 로고    scopus 로고
    • Toward a practical data privacy scheme for a distributed implementation of the Smith-Waterman genome sequence comparison algorithm
    • Szajda, D., Pohl, M., Owen, J., Lawson, B.: Toward a practical data privacy scheme for a distributed implementation of the Smith-Waterman genome sequence comparison algorithm. In: NDSS (2006)
    • (2006) NDSS
    • Szajda, D.1    Pohl, M.2    Owen, J.3    Lawson, B.4
  • 13
    • 67650155437 scopus 로고    scopus 로고
    • Communication-efficient private protocols for longest common subsequence
    • Franklin, M., Gondree, M., Mohassel, P.: Communication-efficient private protocols for longest common subsequence. In: RSA, pp. 265-278 (2009)
    • (2009) RSA , pp. 265-278
    • Franklin, M.1    Gondree, M.2    Mohassel, P.3
  • 14
    • 74049117851 scopus 로고    scopus 로고
    • Longest common subsequence as private search
    • Gondree, M., Mohassel, P.: Longest common subsequence as private search. In: WPES, pp. 81-90 (2009)
    • (2009) WPES , pp. 81-90
    • Gondree, M.1    Mohassel, P.2
  • 15
    • 64049119146 scopus 로고    scopus 로고
    • Efficient oblivious transfer protocols
    • Naor, M., Pinkas, B.: Efficient oblivious transfer protocols. In: SODA, pp. 448-457 (2001)
    • (2001) SODA , pp. 448-457
    • Naor, M.1    Pinkas, B.2
  • 16
    • 33645970169 scopus 로고    scopus 로고
    • An oblivious transfer protocol with log-squared communication
    • Zhou, J., López, J., Deng, R. H., Bao, F. eds., Springer, Heidelberg, ISC 2005
    • Lipmaa, H.: An oblivious transfer protocol with log-squared communication. In: Zhou, J., López, J., Deng, R. H., Bao, F. (eds.) ISC 2005. LNCS, vol. 3650, pp. 314-328. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3650 , pp. 314-328
    • Lipmaa, H.1
  • 17
    • 26444512068 scopus 로고    scopus 로고
    • Single-database private information retrieval with constant communication rate
    • Gentry, C., Ramzan, Z.: Single-database private information retrieval with constant communication rate. In: ICALP, pp. 803-815 (2005)
    • (2005) ICALP , pp. 803-815
    • Gentry, C.1    Ramzan, Z.2
  • 18
    • 0003147279 scopus 로고    scopus 로고
    • Oblivious transfer and polynomial evaluation
    • Naor, M., Pinkas, B.: Oblivious transfer and polynomial evaluation. In: STOC (1999)
    • (1999) STOC
    • Naor, M.1    Pinkas, B.2
  • 19
    • 80051636706 scopus 로고    scopus 로고
    • Single database private information retrieval implies oblivious transfer
    • Preneel, B. ed., Springer, Heidelberg, EUROCRYPT 2000
    • Crescenzo, G., Malkin, T., Ostrovsky, R.: Single database private information retrieval implies oblivious transfer. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 122-138. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1807 , pp. 122-138
    • Crescenzo, G.1    Malkin, T.2    Ostrovsky, R.3
  • 20
    • 1642602228 scopus 로고    scopus 로고
    • Computationally private information retrieval with polylogarithmic communication
    • Stern, J. ed., Springer, Heidelberg, EUROCRYPT 1999
    • Cachin, C., Micali, S., Stadler, M.: Computationally private information retrieval with polylogarithmic communication. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 402-414. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1592 , pp. 402-414
    • Cachin, C.1    Micali, S.2    Stadler, M.3
  • 21
    • 0031378815 scopus 로고    scopus 로고
    • Replication is not needed: Single database, computationally-private information retrieval
    • Kushilevitz, E., Ostrovsky, R.: Replication is not needed: Single database, computationally-private information retrieval. In: IEEE FOCS, pp. 364-373 (1997)
    • (1997) IEEE FOCS , pp. 364-373
    • Kushilevitz, E.1    Ostrovsky, R.2
  • 22
    • 77958470354 scopus 로고    scopus 로고
    • Single-database private information retrieval schemes: Overview, performance study, and usage with statistical databases
    • Melchor, C. A., Deswarte, Y.: Single-database private information retrieval schemes: Overview, performance study, and usage with statistical databases. In: Privacy in Statistical Databases, pp. 257-265 (2006)
    • (2006) Privacy in Statistical Databases , pp. 257-265
    • Melchor, C.A.1    Deswarte, Y.2
  • 23
    • 84921020129 scopus 로고    scopus 로고
    • A lattice-based computationally-efficient private information retrieval protocol
    • Aguilar-Melchor, C., Gaborit, P.: A lattice-based computationally- efficient private information retrieval protocol. In: WEWORC (2007)
    • (2007) WEWORC
    • Aguilar-Melchor, C.1    Gaborit, P.2
  • 27
  • 28
    • 0000731055 scopus 로고    scopus 로고
    • Security and composition of multiparty cryptographic protocols
    • Canetti, R.: Security and composition of multiparty cryptographic protocols. Journal of Cryptology 13(1), 143-202 (2000)
    • (2000) Journal of Cryptology , vol.13 , Issue.1 , pp. 143-202
    • Canetti, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.