-
1
-
-
0242363251
-
Special section on human genetics: With your genes? Take one of these, three times a day
-
A. Abbott. Special section on human genetics: With your genes? Take one of these, three times a day. Nature, 425(6960), 2003.
-
(2003)
Nature
, vol.425
, Issue.6960
-
-
Abbott, A.1
-
2
-
-
84871964242
-
(If) Size Matters: Size-Hiding Private Set Intersection
-
G. Ateniese, E. De Cristofaro, and G. Tsudik. (If) Size Matters: Size-Hiding Private Set Intersection. In PKC, 2011.
-
(2011)
PKC
-
-
Ateniese, G.1
De Cristofaro, E.2
Tsudik, G.3
-
3
-
-
84901019884
-
The Chills and Thrills of Whole Genome Sequencing
-
To Appear in Available from
-
E. Ayday, E. De Cristofaro, J.-P. Hubaux, and G. Tsudik. The Chills and Thrills of Whole Genome Sequencing. To Appear in IEEE Computer. Available from http://arxiv.org/abs/1306.1264, 2013.
-
(2013)
IEEE Computer
-
-
Ayday, E.1
De Cristofaro, E.2
Hubaux, J.-P.3
Tsudik, G.4
-
4
-
-
80755143980
-
Countering GATTACA: Efficient and Secure Testing of Fully-Sequenced Human Genomes
-
P. Baldi, R. Baronio, E. De Cristofaro, P. Gasti, and G. Tsudik. Countering GATTACA: Efficient and Secure Testing of Fully-Sequenced Human Genomes. In CCS, 2011.
-
(2011)
CCS
-
-
Baldi, P.1
Baronio, R.2
De Cristofaro, E.3
Gasti, P.4
Tsudik, G.5
-
5
-
-
84866651327
-
5pm: Secure pattern matching
-
J. Baron, K. El Defrawy, K. Minkovich, R. Ostrovsky, and E. Tressler. 5pm: Secure pattern matching. In SCN, 2012.
-
(2012)
SCN
-
-
Baron, J.1
El Defrawy, K.2
Minkovich, K.3
Ostrovsky, R.4
Tressler, E.5
-
6
-
-
80755173767
-
Secure outsourcing of dna searching via finite automata
-
M. Blanton and M. Aliasgari. Secure outsourcing of dna searching via finite automata. In DBSec, 2010.
-
(2010)
DBSec
-
-
Blanton, M.1
Aliasgari, M.2
-
12
-
-
84895115809
-
Large-Scale Privacy-Preserving Mapping of Human Genomic Sequences on Hybrid Clouds
-
Y. Chen, B. Peng, X. Wang, and H. Tang. Large-Scale Privacy-Preserving Mapping of Human Genomic Sequences on Hybrid Clouds. In NDSS, 2012.
-
(2012)
NDSS
-
-
Chen, Y.1
Peng, B.2
Wang, X.3
Tang, H.4
-
14
-
-
0035819474
-
Implications of the Human Genome Project for medical science
-
F. Collins and V. McKusick. Implications of the Human Genome Project for medical science. Jama, 285(5), 2001.
-
(2001)
Jama
, vol.285
, Issue.5
-
-
Collins, F.1
McKusick, V.2
-
15
-
-
0002908662
-
A generalisation, a simplification and some applications of Paillier's probabilistic public-key system
-
I. Damgård and M. Jurik. A generalisation, a simplification and some applications of Paillier's probabilistic public-key system. In PKC, 2001.
-
(2001)
PKC
-
-
Damgård, I.1
Jurik, M.2
-
16
-
-
84945896337
-
GenoDroid: Are Privacy-Preserving Genomic Tests Ready for Prime Time?
-
E. De Cristofaro, S. Faber, P. Gasti, and G. Tsudik. GenoDroid: Are Privacy-Preserving Genomic Tests Ready for Prime Time? In WPES, 2012.
-
(2012)
WPES
-
-
De Cristofaro, E.1
Faber, S.2
Gasti, P.3
Tsudik, G.4
-
18
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
T. ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE transactions on Information Theory, 31(4), 1985.
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, Issue.4
-
-
ElGamal, T.1
-
19
-
-
33745129227
-
Threshold cryptosystems secure against chosen-ciphertext attacks
-
P.-A. Fouque and D. Pointcheval. Threshold cryptosystems secure against chosen-ciphertext attacks. In ASIACRYPT, 2001.
-
(2001)
ASIACRYPT
-
-
Fouque, P.-A.1
Pointcheval, D.2
-
20
-
-
84888997647
-
Towards secure bioinformatics services (short paper)
-
M. Franz, B. Deiseroth, K. Hamacher, S. Jha, S. Katzenbeisser, and H. Schröder. Towards secure bioinformatics services (short paper). Financial Cryptography and Data Security, 2012.
-
(2012)
Financial Cryptography and Data Security
-
-
Franz, M.1
Deiseroth, B.2
Hamacher, K.3
Jha, S.4
Katzenbeisser, S.5
Schröder, H.6
-
21
-
-
12244263240
-
Efficient private matching and set intersection
-
M. Freedman, K. Nissim, and B. Pinkas. Efficient private matching and set intersection. In EUROCRYPT, 2004.
-
(2004)
EUROCRYPT
-
-
Freedman, M.1
Nissim, K.2
Pinkas, B.3
-
22
-
-
80755159818
-
Text Search Protocols with Simulation Based Security
-
R. Gennaro, C. Hazay, and J. Sorensen. Text Search Protocols with Simulation Based Security. In PKC, 2010.
-
(2010)
PKC
-
-
Gennaro, R.1
Hazay, C.2
Sorensen, J.3
-
23
-
-
84884790397
-
Patenting and Personal Genomics: 23andMe Receives its First Patent, and Plenty of Questions
-
Genomics Law Report. Patenting and Personal Genomics: 23andMe Receives its First Patent, and Plenty of Questions. http://preview.tinyurl.com/7ebpft9, 2012.
-
(2012)
Genomics Law Report
-
-
-
24
-
-
84889031689
-
Some Thoughts on Myriad After the Supreme Court Argument
-
Genomics Law Report. Some Thoughts on Myriad After the Supreme Court Argument. http://preview.tinyurl.com/bqy25wz, 2012.
-
(2012)
Genomics Law Report
-
-
-
25
-
-
70449465250
-
Genomic and personalized medicine: Foundations and applications
-
G. Ginsburg and H. Willard. Genomic and personalized medicine: foundations and applications. Translational Research, 154(6), 2009.
-
(2009)
Translational Research
, vol.154
, Issue.6
-
-
Ginsburg, G.1
Willard, H.2
-
26
-
-
84889047030
-
-
GMP. http://gmplib.org/.
-
-
-
-
27
-
-
84855281324
-
Genomics and privacy: Implications of the new reality of closed data for the field
-
D. Greenbaum, A. Sboner, X. Mu, and M. Gerstein. Genomics and privacy: Implications of the new reality of closed data for the field. PLoS Computational Biology, 7(12), 2011.
-
(2011)
PLoS Computational Biology
, vol.7
, Issue.12
-
-
Greenbaum, D.1
Sboner, A.2
Mu, X.3
Gerstein, M.4
-
28
-
-
84872459720
-
Identifying personal genomes by surname inference
-
M. Gymrek, A. L. McGuire, D. Golan, E. Halperin, and Y. Erlich. Identifying personal genomes by surname inference. Science, 339(6117):321-324, 2013.
-
(2013)
Science
, vol.339
, Issue.6117
, pp. 321-324
-
-
Gymrek, M.1
McGuire, A.L.2
Golan, D.3
Halperin, E.4
Erlich, Y.5
-
29
-
-
62549165432
-
Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries
-
C. Hazay and Y. Lindell. Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries. In TCC, 2008.
-
(2008)
TCC
-
-
Hazay, C.1
Lindell, Y.2
-
30
-
-
80755173761
-
Computationally secure pattern matching in the presence of malicious adversaries
-
C. Hazay and T. Toft. Computationally secure pattern matching in the presence of malicious adversaries. ASIACRYPT, 2010.
-
(2010)
ASIACRYPT
-
-
Hazay, C.1
Toft, T.2
-
31
-
-
50849101381
-
Resolving individuals contributing trace amounts of DNA to highly complex mixtures using high-density SNP genotyping microarrays
-
N. Homer et al. Resolving individuals contributing trace amounts of DNA to highly complex mixtures using high-density SNP genotyping microarrays. PLoS Genetics, 4(8), 2008.
-
(2008)
PLoS Genetics
, vol.4
, Issue.8
-
-
Homer, N.1
-
33
-
-
84888999950
-
Evaluating branching programs on encrypted data
-
Y. Ishai and A. Paskin. Evaluating branching programs on encrypted data. In TCC, 2007.
-
(2007)
TCC
-
-
Ishai, Y.1
Paskin, A.2
-
34
-
-
50249177701
-
Towards practical privacy for genomic computation
-
S. Jha, L. Kruger, and V. Shmatikov. Towards practical privacy for genomic computation. In S&P, 2008.
-
(2008)
S&P
-
-
Jha, S.1
Kruger, L.2
Shmatikov, V.3
-
35
-
-
51749089052
-
A Cryptographic Approach to Securely Share and Query Genomic Sequences
-
M. Kantarcioglu, W. Jiang, Y. Liu, and B. Malin. A Cryptographic Approach to Securely Share and Query Genomic Sequences. IEEE Transactions on Information Technology in Biomedicine, 12(5):606-617, 2008.
-
(2008)
IEEE Transactions on Information Technology in Biomedicine
, vol.12
, Issue.5
, pp. 606-617
-
-
Kantarcioglu, M.1
Jiang, W.2
Liu, Y.3
Malin, B.4
-
36
-
-
78649989154
-
Secure text processing with applications to private dna matching
-
J. Katz and J. Malka. Secure text processing with applications to private dna matching. In CCS, 2010.
-
(2010)
CCS
-
-
Katz, J.1
Malka, J.2
-
38
-
-
11144348715
-
An evaluation of the current state of genomic data privacy protection technology and a roadmap for the future
-
B. Malin. An evaluation of the current state of genomic data privacy protection technology and a roadmap for the future. Journal of the American Medical Informatics Association, 12(1), 2005.
-
(2005)
Journal of the American Medical Informatics Association
, vol.12
, Issue.1
-
-
Malin, B.1
-
39
-
-
85023166810
-
PIRMAP: Efficient Private information Retrieval for MapReduce
-
T. Mayberry, E.-O. Blass, and A. H. Chan. PIRMAP: Efficient Private information Retrieval for MapReduce. In FC, 2013.
-
(2013)
FC
-
-
Mayberry, T.1
Blass, E.-O.2
Chan, A.H.3
-
41
-
-
0001412930
-
A new public-key cryptosystem as secure as factoring
-
T. Okamoto and S. Uchiyama. A new public-key cryptosystem as secure as factoring. In EUROCRYPT, 1998.
-
(1998)
EUROCRYPT
-
-
Okamoto, T.1
Uchiyama, S.2
-
42
-
-
84889033744
-
-
OpenSSL. http://www.openssl.org/.
-
-
-
-
43
-
-
0000277371
-
Public-key cryptosystems based on composite degree residuosity classes
-
P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In EUROCRYPT, 1999.
-
(1999)
EUROCRYPT
-
-
Paillier, P.1
-
45
-
-
51149092061
-
The role of hormonal therapy in the management of hormonal-receptor- positive breast cancer with co-expression of her2
-
A. Prat and J. Baselga. The role of hormonal therapy in the management of hormonal-receptor-positive breast cancer with co-expression of her2. Nature Clinical Practice Oncology, 5(9), 2008.
-
(2008)
Nature Clinical Practice Oncology
, vol.5
, Issue.9
-
-
Prat, A.1
Baselga, J.2
-
46
-
-
84872450521
-
-
Presidential Commission for the Study of Bioethical Issues
-
Presidential Commission for the Study of Bioethical Issues. PRIVACY and PROGRESS in Whole Genome Sequencing. http://www.bioethics.gov/cms/sites/default/ files/PrivacyProgress508.pdf, 2012.
-
(2012)
PRIVACY and PROGRESS in Whole Genome Sequencing
-
-
-
47
-
-
69349086735
-
Genomic privacy and limits of individual detection in a pool
-
S. Sankararaman, G. Obozinski, M. Jordan, and E. Halperin. Genomic privacy and limits of individual detection in a pool. Nature Genetics, 41(9), 2009.
-
(2009)
Nature Genetics
, vol.41
, Issue.9
-
-
Sankararaman, S.1
Obozinski, G.2
Jordan, M.3
Halperin, E.4
-
48
-
-
77953446523
-
The human gene mutation database: 2008 update
-
P. Stenson et al. The human gene mutation database: 2008 update. Genome Medicine, 1(1), 2009.
-
(2009)
Genome Medicine
, vol.1
, Issue.1
-
-
Stenson, P.1
-
49
-
-
57049083569
-
Privacy preserving error resilient dna searching through oblivious automata
-
J. Troncoso-Pastoriza, S. Katzenbeisser, and M. Celik. Privacy preserving error resilient dna searching through oblivious automata. In CCS, 2007.
-
(2007)
CCS
-
-
Troncoso-Pastoriza, J.1
Katzenbeisser, S.2
Celik, M.3
-
50
-
-
79957452485
-
-
arXiv preprint 0903.3900
-
O. Ugus, D. Westhoff, R. Laue, A. Shoufan, and S. A. Huss. Optimized implementation of elliptic curve based additive homomorphic encryption for wireless sensor networks. arXiv preprint 0903.3900, 2009.
-
(2009)
Optimized Implementation of Elliptic Curve Based Additive Homomorphic Encryption for Wireless Sensor Networks
-
-
Ugus, O.1
Westhoff, D.2
Laue, R.3
Shoufan, A.4
Huss, S.A.5
-
51
-
-
74049130896
-
Learning your identity and disease from research papers: Information leaks in Genome Wide Association Study
-
R. Wang et al. Learning your identity and disease from research papers: information leaks in Genome Wide Association Study. In CCS, 2009.
-
(2009)
CCS
-
-
Wang, R.1
-
52
-
-
74049087814
-
Privacy-preserving genomic computation through program specialization
-
R. Wang, X. Wang, Z. Li, H. Tang, M. Reiter, and Z. Dong. Privacy-preserving genomic computation through program specialization. In CCS, 2009.
-
(2009)
CCS
-
-
Wang, R.1
Wang, X.2
Li, Z.3
Tang, H.4
Reiter, M.5
Dong, Z.6
-
55
-
-
84869166261
-
To Release Or Not To Release: Evaluating Information Leaks in Aggregate Human-Genome Data
-
X. Zhou, B. Peng, Y. Li, Y. Chen, H. Tang, and X. Wang. To Release Or Not To Release: Evaluating Information Leaks in Aggregate Human-Genome Data. In ESORICS, 2011.
-
(2011)
ESORICS
-
-
Zhou, X.1
Peng, B.2
Li, Y.3
Chen, Y.4
Tang, H.5
Wang, X.6
|