-
2
-
-
84889068968
-
-
arXiv:1306. 1264
-
E. Ayday, E. D. Cristofaro, G. Tsudik, and J. P. Hubaux, "The chills and thrills of whole genome sequencing," arXiv:1306. 1264, 2013. [Online]. Available: http://arxiv. org/abs/1306. 1264
-
(2013)
The chills and thrills of whole genome sequencing
-
-
Ayday, E.1
Cristofaro, E.D.2
Tsudik, G.3
Hubaux, J.P.4
-
3
-
-
57049083569
-
Privacy preserving error resilient DNA searching through oblivious automata
-
J. R. Troncoso-Pastoriza, S. Katzenbeisser, and M. Celik, "Privacy preserving error resilient DNA searching through oblivious automata," CCS '07: Proceedings of the 14th ACM Conference on Computer and Communica-tions Security, pp. 519-528, 2007.
-
(2007)
CCS '07: Proceedings of the 14th ACM Conference on Computer and Communica-tions Security
, pp. 519-528
-
-
Troncoso-Pastoriza, J.R.1
Katzenbeisser, S.2
Celik, M.3
-
5
-
-
50249177701
-
Towards practical privacy for genomic computation
-
S. Jha, L. Kruger, and V. Shmatikov, "Towards practical privacy for genomic computation," Proceedings of the 2008 IEEE Symposium on Security and Privacy, pp. 216-230, 2008.
-
(2008)
Proceedings of the 2008 IEEE Symposium on Security and Privacy
, pp. 216-230
-
-
Jha, S.1
Kruger, L.2
Shmatikov, V.3
-
6
-
-
77958496068
-
Privacypreserving matching of DNA profiles
-
F. Bruekers, S. Katzenbeisser, K. Kursawe, and P. Tuyls, "Privacypreserving matching of DNA profiles," Tech. Rep., 2008.
-
(2008)
Tech. Rep.
-
-
Bruekers, F.1
Katzenbeisser, S.2
Kursawe, K.3
Tuyls, P.4
-
7
-
-
51749089052
-
A cryptographic approach to securely share and query genomic sequences
-
M. Kantarcioglu, W. Jiang, Y. Liu, and B. Malin, "A cryptographic approach to securely share and query genomic sequences," IEEE Transactions on Information Technology in Biomedicine, vol. 12, no. 5, pp. 606-617, 2008.
-
(2008)
IEEE Transactions on Information Technology in Biomedicine
, vol.12
, Issue.5
, pp. 606-617
-
-
Kantarcioglu, M.1
Jiang, W.2
Liu, Y.3
Malin, B.4
-
8
-
-
80755143980
-
Countering GATTACA: Efficient and secure testing of fully-sequenced human genomes
-
P. Baldi, R. Baronio, E. De Cristofaro, P. Gasti, and G. Tsudik, "Countering GATTACA: Efficient and secure testing of fully-sequenced human genomes," CCS '11: Proceedings of the 18th ACM Conference on Computer and Communications Security, pp. 691-702, 2011.
-
(2011)
CCS '11: Proceedings of the 18th ACM Conference on Computer and Communications Security
, pp. 691-702
-
-
Baldi, P.1
Baronio, R.2
De Cristofaro, E.3
Gasti, P.4
Tsudik, G.5
-
9
-
-
84856847778
-
Secure management of biomedical data with cryptographic hardware
-
M. Canim, M. Kantarcioglu, and B. Malin, "Secure management of biomedical data with cryptographic hardware," IEEE Transactions on Information Technology in Biomedicine, vol. 16, no. 1, 2012.
-
(2012)
IEEE Transactions on Information Technology in Biomedicine
, vol.16
, Issue.1
-
-
Canim, M.1
Kantarcioglu, M.2
Malin, B.3
-
11
-
-
85025126688
-
Privacypreserving computation of disease risk by using genomic, clinical, and environmental data
-
E. Ayday, J. L. Raisaro, P. J. McLaren, J. Fellay, and J. P. Hubaux, "Privacypreserving computation of disease risk by using genomic, clinical, and environmental data," Proceedings of USENIX Security Workshop on Health Information Technologies (HealthTech), 2013.
-
(2013)
Proceedings of USENIX Security Workshop on Health Information Technologies (HealthTech)
-
-
Ayday, E.1
Raisaro, J.L.2
McLaren, P.J.3
Fellay, J.4
Hubaux, J.P.5
-
12
-
-
84888988337
-
Privacy-preserving processing of raw genomic data
-
E. Ayday, J. L. Raisaro, U. Hengartner, A. Molyneaux, and J. P. Hubaux, "Privacy-preserving processing of raw genomic data," Proceedings of 8th Data Privacy Management (DPM 2013) International Workshop (in conjunction with ESORICS), 2013.
-
(2013)
Proceedings of 8th Data Privacy Management (DPM 2013) International Workshop (In Conjunction with ESORICS)
-
-
Ayday, E.1
Raisaro, J.L.2
Hengartner, U.3
Molyneaux, A.4
Hubaux, J.P.5
-
13
-
-
84889006722
-
Addressing the concerns of the Lacks Family: Quantification of kin genomic privacy
-
M. Humbert, E. Ayday, A. Telenti, and J. P. Hubaux, "Addressing the concerns of the Lacks Family: Quantification of kin genomic privacy," Proceedings of 20th ACM Conference on Computer and Communications Security (CCS 2013), 2013.
-
(2013)
Proceedings of 20th ACM Conference on Computer and Communications Security (CCS 2013)
-
-
Humbert, M.1
Ayday, E.2
Telenti, A.3
Hubaux, J.P.4
-
14
-
-
40949149395
-
Polymorphisms associated with cholesterol and risk of cardiovascular events
-
S. Kathiresan, O. Melander, D. Anevski, C. Guiducci, and N. Burtt, "Polymorphisms associated with cholesterol and risk of cardiovascular events," The New England Journal of Medicine, vol. 358, pp. 1240-1249, 2008.
-
(2008)
The New England Journal of Medicine
, vol.358
, pp. 1240-1249
-
-
Kathiresan, S.1
Melander, O.2
Anevski, D.3
Guiducci, C.4
Burtt, N.5
-
15
-
-
77951589703
-
Clinical assessment incorporating a personal genome
-
E. Ashley, A. Butte, M. Wheeler, R. Chen, and T. Klein, "Clinical assessment incorporating a personal genome," The Lancet, vol. 375, no. 9725, pp. 1525-1535, 2010.
-
(2010)
The Lancet
, vol.375
, Issue.9725
, pp. 1525-1535
-
-
Ashley, E.1
Butte, A.2
Wheeler, M.3
Chen, R.4
Klein, T.5
-
16
-
-
85184299776
-
-
Visited on 14/Mar/2013
-
http://www. ncbi. nlm. nih. gov/projects/SNP/, Visited on 14/Mar/2013.
-
-
-
-
17
-
-
84855281324
-
Genomics and privacy: Implications of the new reality of closed data for the field
-
D. Greenbaum, A. Sboner, X. Mu, and M. Gerstein, "Genomics and privacy: Implications of the new reality of closed data for the field," PLoS Computational Biology, vol. 7, no. 12, 2011.
-
(2011)
PLoS Computational Biology
, vol.7
, Issue.12
-
-
Greenbaum, D.1
Sboner, A.2
Mu, X.3
Gerstein, M.4
-
18
-
-
0345058960
-
A simple public-key cryptosystem with a double trapdoor decryption mechanism and its applications
-
E. Bresson, D. Catalano, and D. Pointcheval, "A simple public-key cryptosystem with a double trapdoor decryption mechanism and its applications," Proceedings of Asiacrypt 03, LNCS 2894, pp. 37-54, 2003.
-
(2003)
Proceedings of Asiacrypt 03, LNCS 2894
, pp. 37-54
-
-
Bresson, E.1
Catalano, D.2
Pointcheval, D.3
-
19
-
-
33745218758
-
Improved proxy reencryption schemes with applications to secure distributed storage
-
Feb.
-
G. Ateniese, K. Fu, M. Green, and S. Hohenberger, "Improved proxy reencryption schemes with applications to secure distributed storage," ACM Transactions on Information and System Security, vol. 9, pp. 1-30, Feb. 2006.
-
(2006)
ACM Transactions on Information and System Security
, vol.9
, pp. 1-30
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
21
-
-
3242815149
-
Towards measuring anonymity
-
C. Diaz, S. Seys, J. Claessens, and B. Preneel, "Towards measuring anonymity," Proceedings of Privacy Enhancing Technologies Symposium (PETS), 2002.
-
(2002)
Proceedings of Privacy Enhancing Technologies Symposium (PETS)
-
-
Diaz, C.1
Seys, S.2
Claessens, J.3
Preneel, B.4
-
23
-
-
84975742565
-
A map of human genome variation from population-scale sequencing
-
The 1000 Genomes Project Consortium
-
The 1000 Genomes Project Consortium, "A map of human genome variation from population-scale sequencing," Nature, vol. 467, pp. 1061-1073, 2010.
-
(2010)
Nature
, vol.467
, pp. 1061-1073
-
-
|