-
1
-
-
84910679009
-
-
http://goo.gl/UIm1ds.
-
-
-
-
2
-
-
84910659356
-
-
http://goo.gl/UAusRy.
-
-
-
-
3
-
-
84910674689
-
-
http://www.ncbi.nlm.nih.gov/projects/SNP/.
-
-
-
-
4
-
-
84910661761
-
Protecting and evaluating genomic privacy in medical tests and personalized medicine
-
E. Ayday, J. L. Raisaro, and J. P. Hubaux. Protecting and evaluating genomic privacy in medical tests and personalized medicine. WPES, 2013.
-
(2013)
WPES
-
-
Ayday, E.1
Raisaro, J.L.2
Hubaux, J.P.3
-
5
-
-
85025126688
-
Privacy-preserving computation of disease risk by using genomic, clinical, and environmental data
-
E. Ayday, J. L. Raisaro, P. J. McLaren, J. Fellay, and J. P. Hubaux. Privacy-preserving computation of disease risk by using genomic, clinical, and environmental data. HealthTech, 2013.
-
(2013)
HealthTech
-
-
Ayday, E.1
Raisaro, J.L.2
McLaren, P.J.3
Fellay, J.4
Hubaux, J.P.5
-
6
-
-
80755143980
-
Countering GATTACA: Efficient and secure testing of fully-sequenced human genomes
-
P. Baldi, R. Baronio, E. De Cristofaro, P. Gasti, and G. Tsudik. Countering GATTACA: Efficient and secure testing of fully-sequenced human genomes. CCS, 2011.
-
(2011)
CCS
-
-
Baldi, P.1
Baronio, R.2
De Cristofaro, E.3
Gasti, P.4
Tsudik, G.5
-
7
-
-
80755173767
-
Secure outsourcing of DNA searching via finite automata
-
M. Blanton and M. Aliasgari. Secure outsourcing of DNA searching via finite automata. DBSec, 2010.
-
(2010)
DBSec
-
-
Blanton, M.1
Aliasgari, M.2
-
9
-
-
80053232414
-
Dryadopt: Branch-and-bound on distributed data-parallel execution engines
-
IEEE
-
M. Budiu, D. Delling, and R. F. Werneck. Dryadopt: Branch-and-bound on distributed data-parallel execution engines. In IPDPS, pages 1278-1289. IEEE, 2011.
-
(2011)
IPDPS
, pp. 1278-1289
-
-
Budiu, M.1
Delling, D.2
Werneck, R.F.3
-
10
-
-
66749192419
-
My sister's keeper?: Genomic research and the identifiability of siblings
-
C. A. Cassa, B. Schmidt, I. S. Kohane, and K. D. Mandl. My sister's keeper?: genomic research and the identifiability of siblings. BMC Medical Genomics, 1(1):32, 2008.
-
(2008)
BMC Medical Genomics
, vol.1
, Issue.1
, pp. 32
-
-
Cassa, C.A.1
Schmidt, B.2
Kohane, I.S.3
Mandl, K.D.4
-
11
-
-
84895115809
-
Large-scale privacy-preserving mapping of human genomic sequences on hybrid clouds
-
Y. Chen, B. Peng, X. Wang, and H. Tang. Large-scale privacy-preserving mapping of human genomic sequences on hybrid clouds. NDSS, 2012.
-
(2012)
NDSS
-
-
Chen, Y.1
Peng, B.2
Wang, X.3
Tang, H.4
-
12
-
-
84956991561
-
Simpler protocols for privacy-preserving disease susceptibility testing
-
G. Danezis and E. De Cristofaro. Simpler protocols for privacy-preserving disease susceptibility testing. In GenoPri, 2014.
-
(2014)
GenoPri
-
-
Danezis, G.1
De Cristofaro, E.2
-
13
-
-
84945896337
-
Genodroid: Are privacy-preserving genomic tests ready for prime time?
-
E. De Cristofaro, S. Faber, P. Gasti, and G. Tsudik. Genodroid: Are privacy-preserving genomic tests ready for prime time? In WPES. ACM, 2012.
-
(2012)
WPES ACM
-
-
De Cristofaro, E.1
Faber, S.2
Gasti, P.3
Tsudik, G.4
-
14
-
-
84910629368
-
Secure genomic testing with size-and position-hiding private substring matching
-
E. De Cristofaro, S. Faber, and G. Tsudik. Secure genomic testing with size-and position-hiding private substring matching. In WPES. ACM, 2013.
-
(2013)
WPES ACM
-
-
De Cristofaro, E.1
Faber, S.2
Tsudik, G.3
-
15
-
-
74949138753
-
Human genome sequencing using unchained base reads on self-assembling dna nanoarrays
-
R. Drmanac, A. B. Sparks, M. J. Callow, A. L. Halpern, N. L. Burns, B. G. Kermani, P. Carnevali, I. Nazarenko, G. B. Nilsen, G. Yeung, et al. Human genome sequencing using unchained base reads on self-assembling dna nanoarrays. Science, 327(5961):78-81, 2010.
-
(2010)
Science
, vol.327
, Issue.5961
, pp. 78-81
-
-
Drmanac, R.1
Sparks, A.B.2
Callow, M.J.3
Halpern, A.L.4
Burns, N.L.5
Kermani, B.G.6
Carnevali, P.7
Nazarenko, I.8
Nilsen, G.B.9
Yeung, G.10
-
19
-
-
0348170707
-
The multidimensional 0-1 knapsack problem: An overview
-
A. Fréville. The multidimensional 0-1 knapsack problem: An overview. European Journal of Operational Research, 155(1):1-21, 2004.
-
(2004)
European Journal of Operational Research
, vol.155
, Issue.1
, pp. 1-21
-
-
Fréville, A.1
-
20
-
-
84872459720
-
Identifying personal genomes by surname inference
-
Jan
-
M. Gymrek, A. L. McGuire, D. Golan, E. Halperin, and Y. Erlich. Identifying personal genomes by surname inference. Science: 339 (6117), Jan. 2013.
-
(2013)
Science
, vol.339
, Issue.6117
-
-
Gymrek, M.1
McGuire, A.L.2
Golan, D.3
Halperin, E.4
Erlich, Y.5
-
21
-
-
50849101381
-
Resolving individuals contributing trace amounts of DNA to highly complex mixtures using high-density SNP genotyping microarrays
-
Aug
-
N. Homer, S. Szelinger, M. Redman, D. Duggan, and W. Tembe. Resolving individuals contributing trace amounts of DNA to highly complex mixtures using high-density SNP genotyping microarrays. PLoS Genetics, 4, Aug. 2008.
-
(2008)
PLoS Genetics
, vol.4
-
-
Homer, N.1
Szelinger, S.2
Redman, M.3
Duggan, D.4
Tembe, W.5
-
26
-
-
51749089052
-
A cryptographic approach to securely share and query genomic sequences
-
M. Kantarcioglu, W. Jiang, Y. Liu, and B. Malin. A cryptographic approach to securely share and query genomic sequences. IEEE Transactions on Information Technology in Biomedicine, 12(5):606-617, 2008.
-
(2008)
IEEE Transactions on Information Technology in Biomedicine
, vol.12
, Issue.5
, pp. 606-617
-
-
Kantarcioglu, M.1
Jiang, W.2
Liu, Y.3
Malin, B.4
-
27
-
-
84910607942
-
Inference control for privacy-preserving genome matching
-
F. Kerschbaum, M. Beck, and D. Schönfeld. Inference control for privacy-preserving genome matching. In GenoPri, 2014.
-
(2014)
GenoPri
-
-
Kerschbaum, F.1
Beck, M.2
Schönfeld, D.3
-
28
-
-
83455205957
-
Participant identification in genetic association studies: Improved methods and practical implications
-
N. Masca, P. R. Burton, and N. A. Sheehan. Participant identification in genetic association studies: improved methods and practical implications. International Journal of Epidemiology, 40(6):1629-1642, 2011.
-
(2011)
International Journal of Epidemiology
, vol.40
, Issue.6
, pp. 1629-1642
-
-
Masca, N.1
Burton, P.R.2
Sheehan, N.A.3
-
29
-
-
58349109653
-
On jim watson's APOE status: Genetic information is hard to hide
-
D. Nyholt, C. Yu, and P. Visscher. On Jim Watson's APOE status: Genetic information is hard to hide. European Journal of Human Genetics, 17:147-149, 2009.
-
(2009)
European Journal of Human Genetics
, vol.17
, pp. 147-149
-
-
Nyholt, D.1
Yu, C.2
Visscher, P.3
-
30
-
-
69349086735
-
Genomic privacy and limits of individual detection in a pool
-
S. Sankararaman, G. Obozinski, M. I. Jordan, and E. Halperin. Genomic privacy and limits of individual detection in a pool. Nature genetics, 41(9):965-967, 2009.
-
(2009)
Nature Genetics
, vol.41
, Issue.9
, pp. 965-967
-
-
Sankararaman, S.1
Obozinski, G.2
Jordan, M.I.3
Halperin, E.4
-
31
-
-
84974859764
-
A branch and bound method for the multiconstraint zero-one knapsack problem
-
W. Shih. A branch and bound method for the multiconstraint zero-one knapsack problem. Journal of the Operational Research Society, pages 369-378, 1979.
-
(1979)
Journal of the Operational Research Society
, pp. 369-378
-
-
Shih, W.1
-
32
-
-
84910653318
-
Forensic genomics: Kin privacy, driftnets and other open questions
-
F. Stajano, L. Bianchi, P. Liò, and D. Korff. Forensic genomics: kin privacy, driftnets and other open questions. In WPES. ACM, 2008.
-
(2008)
WPES ACM
-
-
Stajano, F.1
Bianchi, L.2
Liò, P.3
Korff, D.4
-
35
-
-
74049130896
-
Learning your identity and disease from research papers: Information leaks in genome wide association study
-
R. Wang, Y. F. Li, X. Wang, H. Tang, and X. Zhou. Learning your identity and disease from research papers: Information leaks in genome wide association study. Proceedings of the 16th ACM CCS, pages 534-544, 2009.
-
(2009)
Proceedings of the 16th ACM CCS
, pp. 534-544
-
-
Wang, R.1
Li, Y.F.2
Wang, X.3
Tang, H.4
Zhou, X.5
-
36
-
-
74049087814
-
Privacy-preserving genomic computation through program specialization
-
R. Wang, X. Wang, Z. Li, H. Tang, M. K. Reiter, and Z. Dong. Privacy-preserving genomic computation through program specialization. Proceedings of the 16th ACM CCS, pages 338-347, 2009.
-
(2009)
Proceedings of the 16th ACM CCS
, pp. 338-347
-
-
Wang, R.1
Wang, X.2
Li, Z.3
Tang, H.4
Reiter, M.K.5
Dong, Z.6
-
37
-
-
84869166261
-
To release or not to release: Evaluating information leaks in aggregate human-genome data
-
X. Zhou, B. Peng, Y. F. Li, Y. Chen, H. Tang, and X. Wang. To release or not to release: Evaluating information leaks in aggregate human-genome data. ESORICS, 2011.
-
(2011)
ESORICS
-
-
Zhou, X.1
Peng, B.2
Li, Y.F.3
Chen, Y.4
Tang, H.5
Wang, X.6
|