메뉴 건너뛰기




Volumn 7459 LNCS, Issue , 2012, Pages 505-522

Secure and efficient outsourcing of sequence comparisons

Author keywords

[No Author keywords available]

Indexed keywords

ALPHABET SIZE; GARBLED CIRCUITS; INPUT STRING; OUTPUT SEQUENCES; REMOTE SERVERS; SEQUENCE COMPARISONS;

EID: 84865590663     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-33167-1_29     Document Type: Conference Paper
Times cited : (61)

References (22)
  • 2
    • 24344475303 scopus 로고    scopus 로고
    • Secure Outsourcing of Sequence Comparisons
    • Martin, D., Serjantov, A. (eds.) PET 2004. Springer, Heidelberg
    • Atallah, M.J., Li, J.: Secure Outsourcing of Sequence Comparisons. In: Martin, D., Serjantov, A. (eds.) PET 2004. LNCS, vol. 3424, pp. 63-78. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3424 , pp. 63-78
    • Atallah, M.J.1    Li, J.2
  • 4
    • 85129493630 scopus 로고    scopus 로고
    • Toward a practical data privacy scheme for a distributed implementation of the Smith-Waterman genome sequence comparison algorithm
    • Szajda, D., Pohl, M., Owen, J., Lawson, B.: Toward a practical data privacy scheme for a distributed implementation of the Smith-Waterman genome sequence comparison algorithm. In: NDSS (2006)
    • (2006) NDSS
    • Szajda, D.1    Pohl, M.2    Owen, J.3    Lawson, B.4
  • 5
    • 57049083569 scopus 로고    scopus 로고
    • Privacy preserving error resilient DNA searching through oblivious automata
    • Troncoso-Pastoriza, J., Katzenbeisser, S., Celik, M.: Privacy preserving error resilient DNA searching through oblivious automata. In: CCS, pp. 519-528 (2007)
    • (2007) CCS , pp. 519-528
    • Troncoso-Pastoriza, J.1    Katzenbeisser, S.2    Celik, M.3
  • 7
    • 70350370031 scopus 로고    scopus 로고
    • Practical Private DNA String Searching and Matching through Efficient Oblivious Automata Evaluation
    • Gudes, E., Vaidya, J. (eds.) Data and Applications Security XXIII. Springer, Heidelberg
    • Frikken, K.: Practical Private DNA String Searching and Matching through Efficient Oblivious Automata Evaluation. In: Gudes, E., Vaidya, J. (eds.) Data and Applications Security XXIII. LNCS, vol. 5645, pp. 81-94. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5645 , pp. 81-94
    • Frikken, K.1
  • 8
    • 77958487669 scopus 로고    scopus 로고
    • Secure Outsourcing of DNA Searching via Finite Automata
    • Foresti, S., Jajodia, S. (eds.) Data and Applications Security and Privacy XXIV. Springer, Heidelberg
    • Blanton, M., Aliasgari, M.: Secure Outsourcing of DNA Searching via Finite Automata. In: Foresti, S., Jajodia, S. (eds.) Data and Applications Security and Privacy XXIV. LNCS, vol. 6166, pp. 49-64. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6166 , pp. 49-64
    • Blanton, M.1    Aliasgari, M.2
  • 10
    • 80755143980 scopus 로고    scopus 로고
    • Countering GATTACA: Efficient and secure testing of fully-sequenced human genomes
    • Baldi, P., Baronio, R., De Cristofaro, E., Gasti, P., Tsudik, G.: Countering GATTACA: Efficient and secure testing of fully-sequenced human genomes. In: CCS, pp. 691-702 (2011)
    • (2011) CCS , pp. 691-702
    • Baldi, P.1    Baronio, R.2    De Cristofaro, E.3    Gasti, P.4    Tsudik, G.5
  • 11
    • 57049188348 scopus 로고    scopus 로고
    • Sharemind: A Framework for Fast Privacy-Preserving Computations
    • Jajodia, S., Lopez, J. (eds.) ESORICS 2008. Springer, Heidelberg
    • Bogdanov, D., Laur, S., Willemson, J.: Sharemind: A Framework for Fast Privacy-Preserving Computations. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 192-206. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5283 , pp. 192-206
    • Bogdanov, D.1    Laur, S.2    Willemson, J.3
  • 12
    • 0016881995 scopus 로고
    • Bounds for the string editing problem
    • Wong, C., Chandra, A.: Bounds for the string editing problem. Journal of the ACM 23(1), 13-16 (1976)
    • (1976) Journal of the ACM , vol.23 , Issue.1 , pp. 13-16
    • Wong, C.1    Chandra, A.2
  • 13
    • 78649820323 scopus 로고    scopus 로고
    • Basic Applications
    • Cambridge University Press
    • Goldreich, O.: Foundations of Cryptography: Volume 2, Basic Applications. Cambridge University Press (2004)
    • (2004) Foundations of Cryptography , vol.2
    • Goldreich, O.1
  • 14
    • 38049082907 scopus 로고    scopus 로고
    • Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries
    • Vadhan, S.P. (ed.) TCC 2007. Springer, Heidelberg
    • Aumann, Y., Lindell, Y.: Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 137-156. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4392 , pp. 137-156
    • Aumann, Y.1    Lindell, Y.2
  • 15
    • 38049136534 scopus 로고    scopus 로고
    • An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries
    • Naor, M. (ed.) EUROCRYPT 2007. Springer, Heidelberg
    • Lindell, Y., Pinkas, B.: An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 52-78. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4515 , pp. 52-78
    • Lindell, Y.1    Pinkas, B.2
  • 16
    • 79953241261 scopus 로고    scopus 로고
    • Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer
    • Ishai, Y. (ed.) TCC 2011. Springer, Heidelberg
    • Lindell, Y., Pinkas, B.: Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer. In: Ishai, Y. (ed.) TCC 2011. LNCS, vol. 6597, pp. 329-346. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6597 , pp. 329-346
    • Lindell, Y.1    Pinkas, B.2
  • 17
    • 0015960104 scopus 로고
    • The string to string correction problem
    • Wagner, R., Fischer, M.: The string to string correction problem. Journal of the ACM 21(1), 168-173 (1974)
    • (1974) Journal of the ACM , vol.21 , Issue.1 , pp. 168-173
    • Wagner, R.1    Fischer, M.2
  • 18
    • 0022882770 scopus 로고
    • How to generate and exchange secrets
    • Yao, A.: How to generate and exchange secrets. In: FOCS, pp. 162-167 (1986)
    • (1986) FOCS , pp. 162-167
    • Yao, A.1
  • 19
    • 49049099825 scopus 로고    scopus 로고
    • Improved Garbled Circuit: Free XOR Gates and Applications
    • Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. Springer, Heidelberg
    • Kolesnikov, V., Schneider, T.: Improved Garbled Circuit: Free XOR Gates and Applications. In: Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. LNCS, vol. 5126, pp. 486-498. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5126 , pp. 486-498
    • Kolesnikov, V.1    Schneider, T.2
  • 20
    • 72449131818 scopus 로고    scopus 로고
    • Secure Two-Party Computation Is Practical
    • Matsui, M. (ed.) ASIACRYPT 2009. Springer, Heidelberg
    • Pinkas, B., Schneider, T., Smart, N., Williams, S.: Secure Two-Party Computation Is Practical. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 250-267. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5912 , pp. 250-267
    • Pinkas, B.1    Schneider, T.2    Smart, N.3    Williams, S.4
  • 21
    • 71549170830 scopus 로고    scopus 로고
    • Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima
    • Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. Springer, Heidelberg
    • Kolesnikov, V., Sadeghi, A.R., Schneider, T.: Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol. 5888, pp. 1-20. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5888 , pp. 1-20
    • Kolesnikov, V.1    Sadeghi, A.R.2    Schneider, T.3
  • 22
    • 80053027350 scopus 로고    scopus 로고
    • Secure and Efficient Protocols for Iris and Fingerprint Identification
    • Atluri, V., Diaz, C. (eds.) ESORICS 2011. Springer, Heidelberg
    • Blanton, M., Gasti, P.: Secure and Efficient Protocols for Iris and Fingerprint Identification. In: Atluri, V., Diaz, C. (eds.) ESORICS 2011. LNCS, vol. 6879, pp. 190-209. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6879 , pp. 190-209
    • Blanton, M.1    Gasti, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.