-
2
-
-
24344475303
-
Secure Outsourcing of Sequence Comparisons
-
Martin, D., Serjantov, A. (eds.) PET 2004. Springer, Heidelberg
-
Atallah, M.J., Li, J.: Secure Outsourcing of Sequence Comparisons. In: Martin, D., Serjantov, A. (eds.) PET 2004. LNCS, vol. 3424, pp. 63-78. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3424
, pp. 63-78
-
-
Atallah, M.J.1
Li, J.2
-
4
-
-
85129493630
-
Toward a practical data privacy scheme for a distributed implementation of the Smith-Waterman genome sequence comparison algorithm
-
Szajda, D., Pohl, M., Owen, J., Lawson, B.: Toward a practical data privacy scheme for a distributed implementation of the Smith-Waterman genome sequence comparison algorithm. In: NDSS (2006)
-
(2006)
NDSS
-
-
Szajda, D.1
Pohl, M.2
Owen, J.3
Lawson, B.4
-
5
-
-
57049083569
-
Privacy preserving error resilient DNA searching through oblivious automata
-
Troncoso-Pastoriza, J., Katzenbeisser, S., Celik, M.: Privacy preserving error resilient DNA searching through oblivious automata. In: CCS, pp. 519-528 (2007)
-
(2007)
CCS
, pp. 519-528
-
-
Troncoso-Pastoriza, J.1
Katzenbeisser, S.2
Celik, M.3
-
6
-
-
50249177701
-
Toward practical privacy for genomic computation
-
Jha, S., Kruger, L., Shmatikov, V.: Toward practical privacy for genomic computation. In: IEEE Symposium on Security and Privacy, pp. 216-230 (2008)
-
(2008)
IEEE Symposium on Security and Privacy
, pp. 216-230
-
-
Jha, S.1
Kruger, L.2
Shmatikov, V.3
-
7
-
-
70350370031
-
Practical Private DNA String Searching and Matching through Efficient Oblivious Automata Evaluation
-
Gudes, E., Vaidya, J. (eds.) Data and Applications Security XXIII. Springer, Heidelberg
-
Frikken, K.: Practical Private DNA String Searching and Matching through Efficient Oblivious Automata Evaluation. In: Gudes, E., Vaidya, J. (eds.) Data and Applications Security XXIII. LNCS, vol. 5645, pp. 81-94. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5645
, pp. 81-94
-
-
Frikken, K.1
-
8
-
-
77958487669
-
Secure Outsourcing of DNA Searching via Finite Automata
-
Foresti, S., Jajodia, S. (eds.) Data and Applications Security and Privacy XXIV. Springer, Heidelberg
-
Blanton, M., Aliasgari, M.: Secure Outsourcing of DNA Searching via Finite Automata. In: Foresti, S., Jajodia, S. (eds.) Data and Applications Security and Privacy XXIV. LNCS, vol. 6166, pp. 49-64. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6166
, pp. 49-64
-
-
Blanton, M.1
Aliasgari, M.2
-
9
-
-
84914127581
-
Faster secure two-party computation using garbled circuits
-
Huang, Y., Evans, D., Katz, J., Malka, L.: Faster secure two-party computation using garbled circuits. In: USENIX Security Symposium (2011)
-
USENIX Security Symposium (2011)
-
-
Huang, Y.1
Evans, D.2
Katz, J.3
Malka, L.4
-
10
-
-
80755143980
-
Countering GATTACA: Efficient and secure testing of fully-sequenced human genomes
-
Baldi, P., Baronio, R., De Cristofaro, E., Gasti, P., Tsudik, G.: Countering GATTACA: Efficient and secure testing of fully-sequenced human genomes. In: CCS, pp. 691-702 (2011)
-
(2011)
CCS
, pp. 691-702
-
-
Baldi, P.1
Baronio, R.2
De Cristofaro, E.3
Gasti, P.4
Tsudik, G.5
-
11
-
-
57049188348
-
Sharemind: A Framework for Fast Privacy-Preserving Computations
-
Jajodia, S., Lopez, J. (eds.) ESORICS 2008. Springer, Heidelberg
-
Bogdanov, D., Laur, S., Willemson, J.: Sharemind: A Framework for Fast Privacy-Preserving Computations. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 192-206. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5283
, pp. 192-206
-
-
Bogdanov, D.1
Laur, S.2
Willemson, J.3
-
12
-
-
0016881995
-
Bounds for the string editing problem
-
Wong, C., Chandra, A.: Bounds for the string editing problem. Journal of the ACM 23(1), 13-16 (1976)
-
(1976)
Journal of the ACM
, vol.23
, Issue.1
, pp. 13-16
-
-
Wong, C.1
Chandra, A.2
-
13
-
-
78649820323
-
Basic Applications
-
Cambridge University Press
-
Goldreich, O.: Foundations of Cryptography: Volume 2, Basic Applications. Cambridge University Press (2004)
-
(2004)
Foundations of Cryptography
, vol.2
-
-
Goldreich, O.1
-
14
-
-
38049082907
-
Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries
-
Vadhan, S.P. (ed.) TCC 2007. Springer, Heidelberg
-
Aumann, Y., Lindell, Y.: Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 137-156. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4392
, pp. 137-156
-
-
Aumann, Y.1
Lindell, Y.2
-
15
-
-
38049136534
-
An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries
-
Naor, M. (ed.) EUROCRYPT 2007. Springer, Heidelberg
-
Lindell, Y., Pinkas, B.: An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 52-78. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4515
, pp. 52-78
-
-
Lindell, Y.1
Pinkas, B.2
-
16
-
-
79953241261
-
Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer
-
Ishai, Y. (ed.) TCC 2011. Springer, Heidelberg
-
Lindell, Y., Pinkas, B.: Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer. In: Ishai, Y. (ed.) TCC 2011. LNCS, vol. 6597, pp. 329-346. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6597
, pp. 329-346
-
-
Lindell, Y.1
Pinkas, B.2
-
17
-
-
0015960104
-
The string to string correction problem
-
Wagner, R., Fischer, M.: The string to string correction problem. Journal of the ACM 21(1), 168-173 (1974)
-
(1974)
Journal of the ACM
, vol.21
, Issue.1
, pp. 168-173
-
-
Wagner, R.1
Fischer, M.2
-
18
-
-
0022882770
-
How to generate and exchange secrets
-
Yao, A.: How to generate and exchange secrets. In: FOCS, pp. 162-167 (1986)
-
(1986)
FOCS
, pp. 162-167
-
-
Yao, A.1
-
19
-
-
49049099825
-
Improved Garbled Circuit: Free XOR Gates and Applications
-
Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. Springer, Heidelberg
-
Kolesnikov, V., Schneider, T.: Improved Garbled Circuit: Free XOR Gates and Applications. In: Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. LNCS, vol. 5126, pp. 486-498. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5126
, pp. 486-498
-
-
Kolesnikov, V.1
Schneider, T.2
-
20
-
-
72449131818
-
Secure Two-Party Computation Is Practical
-
Matsui, M. (ed.) ASIACRYPT 2009. Springer, Heidelberg
-
Pinkas, B., Schneider, T., Smart, N., Williams, S.: Secure Two-Party Computation Is Practical. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 250-267. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5912
, pp. 250-267
-
-
Pinkas, B.1
Schneider, T.2
Smart, N.3
Williams, S.4
-
21
-
-
71549170830
-
Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima
-
Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. Springer, Heidelberg
-
Kolesnikov, V., Sadeghi, A.R., Schneider, T.: Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol. 5888, pp. 1-20. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5888
, pp. 1-20
-
-
Kolesnikov, V.1
Sadeghi, A.R.2
Schneider, T.3
-
22
-
-
80053027350
-
Secure and Efficient Protocols for Iris and Fingerprint Identification
-
Atluri, V., Diaz, C. (eds.) ESORICS 2011. Springer, Heidelberg
-
Blanton, M., Gasti, P.: Secure and Efficient Protocols for Iris and Fingerprint Identification. In: Atluri, V., Diaz, C. (eds.) ESORICS 2011. LNCS, vol. 6879, pp. 190-209. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6879
, pp. 190-209
-
-
Blanton, M.1
Gasti, P.2
|