-
1
-
-
0042360195
-
Welcome to the genomic era
-
pMID: 12954750
-
Guttmacher A.E., Collins F.S. Welcome to the genomic era. N. Engl. J. Med. 2003, 349(10):996-998. pMID: 12954750. 10.1056/NEJMe038132.
-
(2003)
N. Engl. J. Med.
, vol.349
, Issue.10
, pp. 996-998
-
-
Guttmacher, A.E.1
Collins, F.S.2
-
2
-
-
84889059821
-
Identifying participants in the personal genome project by name (A re-identification experiment)
-
CoRR abs/1304.7605
-
L. Sweeney, A. Abu, J. Winn, Identifying participants in the personal genome project by name (A re-identification experiment), CoRR abs/1304.7605, 2013.
-
(2013)
-
-
Sweeney, L.1
Abu, A.2
Winn, J.3
-
3
-
-
84872459720
-
Identifying personal genomes by surname inference
-
Gymrek M., McGuire A.L., Golan D., Halperin E., Erlich Y. Identifying personal genomes by surname inference. Science 2013, 339(6117):321-324.
-
(2013)
Science
, vol.339
, Issue.6117
, pp. 321-324
-
-
Gymrek, M.1
McGuire, A.L.2
Golan, D.3
Halperin, E.4
Erlich, Y.5
-
4
-
-
11144348715
-
Technical evaluation: an evaluation of the current state of genomic data privacy protection technology and a roadmap for the future
-
Malin B.A. Technical evaluation: an evaluation of the current state of genomic data privacy protection technology and a roadmap for the future. JAMIA 2005, 12(1):28-34.
-
(2005)
JAMIA
, vol.12
, Issue.1
, pp. 28-34
-
-
Malin, B.A.1
-
5
-
-
84901005679
-
Routes for breaching and protecting genetic privacy
-
Erlich Y., Narayanan A. Routes for breaching and protecting genetic privacy. Nat. Rev. Genet. 2014.
-
(2014)
Nat. Rev. Genet.
-
-
Erlich, Y.1
Narayanan, A.2
-
6
-
-
84938669382
-
Privacy and security in the genomic era
-
CoRR abs/1405.1891
-
M. Naveed, E. Ayday, E.W. Clayton, J. Fellay, C.A. Gunter, J. Hubaux, B.A. Malin, X. Wang, Privacy and security in the genomic era, CoRR abs/1405.1891, 2014.
-
(2014)
-
-
Naveed, M.1
Ayday, E.2
Clayton, E.W.3
Fellay, J.4
Gunter, C.A.5
Hubaux, J.6
Malin, B.A.7
Wang, X.8
-
7
-
-
0035895505
-
The sequence of the human genome
-
Venter J.C., Adams M.D., Myers E.W., Li P.W., Mural R.J., Sutton G.G., Smith H.O., Yandell M., Evans C.A., Holt R.A., Gocayne J.D., Amanatides P., Ballew R.M., Huson D.H., Wortman J.R., Zhang Q., Kodira C.D., Zheng X.H., Chen L., Skupski M., Subramanian G., Thomas P.D., Zhang J., Miklos G.L.G., Nelson C., Broder S., Clark A.G., Nadeau J., McKusick V.A., Zinder N., Levine A.J., Roberts R.J., Simon M., Slayman C., Hunkapiller M., Bolanos R., Delcher A., Dew I., Fasulo D., Flanigan M., Florea L., Halpern A., Hannenhalli S., Kravitz S., Levy S., Mobarry C., Reinert K., Remington K., Abu-Threideh J., Beasley E., Biddick K., Bonazzi V., Brandon R., Cargill M., Chandramouliswaran I., Charlab R., Chaturvedi K., Deng Z., Francesco V.D., Dunn P., Eilbeck K., Evangelista C., Gabrielian A.E., Gan W., Ge W., Gong F., Gu Z., Guan P., Heiman T.J., Higgins M.E., Ji R.-R., Ke Z., Ketchum K.A., Lai Z., Lei Y., Li Z., Li J., Liang Y., Lin X., Lu F., Merkulov G.V., Milshina N., Moore H.M., Naik A.K., Narayan V.A., Neelam B., Nusskern D., Rusch D.B., Salzberg S., Shao W., Shue B., Sun J., Wang Z.Y., Wang A., Wang X., Wang J., Wei M.-H., Wides R., Xiao C., Yan E.A., Chunhua The sequence of the human genome. Science 2001, 291(5507):1304-1351.
-
(2001)
Science
, vol.291
, Issue.5507
, pp. 1304-1351
-
-
Venter, J.C.1
Adams, M.D.2
Myers, E.W.3
Li, P.W.4
Mural, R.J.5
Sutton, G.G.6
Smith, H.O.7
Yandell, M.8
Evans, C.A.9
Holt, R.A.10
Gocayne, J.D.11
Amanatides, P.12
Ballew, R.M.13
Huson, D.H.14
Wortman, J.R.15
Zhang, Q.16
Kodira, C.D.17
Zheng, X.H.18
Chen, L.19
Skupski, M.20
Subramanian, G.21
Thomas, P.D.22
Zhang, J.23
Miklos, G.L.G.24
Nelson, C.25
Broder, S.26
Clark, A.G.27
Nadeau, J.28
McKusick, V.A.29
Zinder, N.30
Levine, A.J.31
Roberts, R.J.32
Simon, M.33
Slayman, C.34
Hunkapiller, M.35
Bolanos, R.36
Delcher, A.37
Dew, I.38
Fasulo, D.39
Flanigan, M.40
Florea, L.41
Halpern, A.42
Hannenhalli, S.43
Kravitz, S.44
Levy, S.45
Mobarry, C.46
Reinert, K.47
Remington, K.48
Abu-Threideh, J.49
Beasley, E.50
Biddick, K.51
Bonazzi, V.52
Brandon, R.53
Cargill, M.54
Chandramouliswaran, I.55
Charlab, R.56
Chaturvedi, K.57
Deng, Z.58
Francesco, V.D.59
Dunn, P.60
Eilbeck, K.61
Evangelista, C.62
Gabrielian, A.E.63
Gan, W.64
Ge, W.65
Gong, F.66
Gu, Z.67
Guan, P.68
Heiman, T.J.69
Higgins, M.E.70
Ji, R.-R.71
Ke, Z.72
Ketchum, K.A.73
Lai, Z.74
Lei, Y.75
Li, Z.76
Li, J.77
Liang, Y.78
Lin, X.79
Lu, F.80
Merkulov, G.V.81
Milshina, N.82
Moore, H.M.83
Naik, A.K.84
Narayan, V.A.85
Neelam, B.86
Nusskern, D.87
Rusch, D.B.88
Salzberg, S.89
Shao, W.90
Shue, B.91
Sun, J.92
Wang, Z.Y.93
Wang, A.94
Wang, X.95
Wang, J.96
Wei, M.-H.97
Wides, R.98
Xiao, C.99
more..
-
8
-
-
78651271733
-
Integrative genomics viewer
-
Robinson J.T., Thorvaldsdóttir H., Winckler W., Guttman M., Lander E.S., Getz G., Mesirov J.P. Integrative genomics viewer. Nat. Biotechnol. 2011, 29(1):24-26.
-
(2011)
Nat. Biotechnol.
, vol.29
, Issue.1
, pp. 24-26
-
-
Robinson, J.T.1
Thorvaldsdóttir, H.2
Winckler, W.3
Guttman, M.4
Lander, E.S.5
Getz, G.6
Mesirov, J.P.7
-
9
-
-
84867119898
-
Integrative genomics viewer (IGV): high-performance genomics data visualization and exploration
-
Thorvaldsdóttir H., Robinson J.T., Mesirov J.P. Integrative genomics viewer (IGV): high-performance genomics data visualization and exploration. Briefings Bioinform. 2012.
-
(2012)
Briefings Bioinform.
-
-
Thorvaldsdóttir, H.1
Robinson, J.T.2
Mesirov, J.P.3
-
10
-
-
84902310904
-
Human genome in a smart card
-
in: HEALTHINF
-
M. Akgün, B. Ergüner, A.O. Bayrak, M.S. Sagiroglu, Human genome in a smart card, in: HEALTHINF, 2014, pp. 122-126.
-
(2014)
, pp. 122-126
-
-
Akgün, M.1
Ergüner, B.2
Bayrak, A.O.3
Sagiroglu, M.S.4
-
11
-
-
84938669384
-
Large-scale privacy-preserving mapping of human genomic sequences on hybrid clouds
-
in: NDSS
-
Y. Chen, B. Peng, X. Wang, H. Tang, Large-scale privacy-preserving mapping of human genomic sequences on hybrid clouds, in: NDSS, 2012.
-
(2012)
-
-
Chen, Y.1
Peng, B.2
Wang, X.3
Tang, H.4
-
12
-
-
0042960934
-
Fast and practical approximate string matching
-
Baeza-Yates R.A., Perleberg C.H. Fast and practical approximate string matching. Inf. Process. Lett. 1996, 59(1):21-27.
-
(1996)
Inf. Process. Lett.
, vol.59
, Issue.1
, pp. 21-27
-
-
Baeza-Yates, R.A.1
Perleberg, C.H.2
-
13
-
-
84902319149
-
Privacy-Enhancing Technologies for Medical Tests Using Genomic Data
-
E. Ayday, J.L. Raisaro, J.-P. Hubaux, Privacy-Enhancing Technologies for Medical Tests Using Genomic Data, Tech. rep., 2012.
-
(2012)
Tech. rep
-
-
Ayday, E.1
Raisaro, J.L.2
Hubaux, J.-P.3
-
14
-
-
85025126688
-
Privacy-preserving computation of disease risk by using genomic, clinical, and environmental data
-
in: Proceedings of USENIX Security Workshop on Health Information Technologies (HealthTech '13)
-
E. Ayday, J.L. Raisaro, M. Laren, P. Jack, J. Fellay, J.-P. Hubaux, Privacy-preserving computation of disease risk by using genomic, clinical, and environmental data, in: Proceedings of USENIX Security Workshop on Health Information Technologies (HealthTech '13), 2013.
-
(2013)
-
-
Ayday, E.1
Raisaro, J.L.2
Laren, M.3
Jack, P.4
Fellay, J.5
Hubaux, J.-P.6
-
15
-
-
85184289761
-
Personal use of the genomic data: privacy vs. storage cost
-
in: IEEE Global Communications Conference, Exhibition and Industry Forum GLOBECOM
-
E. Ayday, J.L. Raisaro, J.-P. Hubaux, Personal use of the genomic data: privacy vs. storage cost, in: IEEE Global Communications Conference, Exhibition and Industry Forum GLOBECOM, 2013.
-
(2013)
-
-
Ayday, E.1
Raisaro, J.L.2
Hubaux, J.-P.3
-
16
-
-
70449627419
-
The mastermind attack on genomic data
-
in: 30th IEEE Symposium on Security and Privacy
-
M. Goodrich, The mastermind attack on genomic data, in: 30th IEEE Symposium on Security and Privacy, 2009, pp. 204-218.
-
(2009)
, pp. 204-218
-
-
Goodrich, M.1
-
17
-
-
1642327704
-
Secure and private sequence comparisons
-
ACM, New York, NY, USA, Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society
-
Atallah M.J., Kerschbaum F., Du W. Secure and private sequence comparisons. WPES '03 2003, 39-44. ACM, New York, NY, USA. 10.1145/1005140.1005147.
-
(2003)
WPES '03
, pp. 39-44
-
-
Atallah, M.J.1
Kerschbaum, F.2
Du, W.3
-
18
-
-
50249177701
-
Towards practical privacy for genomic computation
-
in: IEEE Symposium on Security and Privacy, 2008, SP 2008
-
S. Jha, L. Kruger, V. Shmatikov, Towards practical privacy for genomic computation, in: IEEE Symposium on Security and Privacy, 2008, SP 2008, 2008, pp. 216-230. doi:10.1109/SP.2008.34.
-
(2008)
, pp. 216-230
-
-
Jha, S.1
Kruger, L.2
Shmatikov, V.3
-
19
-
-
85129493630
-
Toward a practical data privacy scheme for a distributed implementation of the smith-waterman genome sequence comparison algorithm
-
in: Proceedings of the Network and Distributed System Security Symposium, NDSS 2006, San Diego, California, USA
-
D. Szajda, M. Pohl, J. Owen, B.G. Lawson, Toward a practical data privacy scheme for a distributed implementation of the smith-waterman genome sequence comparison algorithm, in: Proceedings of the Network and Distributed System Security Symposium, NDSS 2006, San Diego, California, USA, 2006.
-
(2006)
-
-
Szajda, D.1
Pohl, M.2
Owen, J.3
Lawson, B.G.4
-
20
-
-
74049087814
-
Privacy-preserving genomic computation through program specialization
-
ACM, New York, NY, USA, Proceedings of the 16th ACM Conference on Computer and Communications Security
-
Wang R., Wang X., Li Z., Tang H., Reiter M.K., Dong Z. Privacy-preserving genomic computation through program specialization. CCS '09 2009, 338-347. ACM, New York, NY, USA.
-
(2009)
CCS '09
, pp. 338-347
-
-
Wang, R.1
Wang, X.2
Li, Z.3
Tang, H.4
Reiter, M.K.5
Dong, Z.6
-
21
-
-
57049083569
-
Privacy preserving error resilient dna searching through oblivious automata
-
ACM, New York, NY, USA, Proceedings of the 14th ACM Conference on Computer and Communications Security
-
Troncoso-Pastoriza J.R., Katzenbeisser S., Celik M. Privacy preserving error resilient dna searching through oblivious automata. CCS '07 2007, 519-528. ACM, New York, NY, USA.
-
(2007)
CCS '07
, pp. 519-528
-
-
Troncoso-Pastoriza, J.R.1
Katzenbeisser, S.2
Celik, M.3
-
22
-
-
77958487669
-
Secure outsourcing of dna searching via finite automata
-
Springer-Verlag, Berlin, Heidelberg, Proceedings of the 24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy
-
Blanton M., Aliasgari M. Secure outsourcing of dna searching via finite automata. DBSec'10 2010, 49-64. Springer-Verlag, Berlin, Heidelberg.
-
(2010)
DBSec'10
, pp. 49-64
-
-
Blanton, M.1
Aliasgari, M.2
-
23
-
-
77958496068
-
Privacy-Preserving Matching of DNA Profiles
-
Cryptology ePrint Archive, Report 2008/203
-
F. Bruekers, S. Katzenbeisser, K. Kursawe, P. Tuyls, Privacy-Preserving Matching of DNA Profiles, Cryptology ePrint Archive, Report 2008/203, 2008.
-
(2008)
-
-
Bruekers, F.1
Katzenbeisser, S.2
Kursawe, K.3
Tuyls, P.4
-
24
-
-
84893299015
-
Privacy-enhanced methods for comparing compressed dna sequences
-
CoRR abs/1107.3593
-
D. Eppstein, M.T. Goodrich, P. Baldi, Privacy-enhanced methods for comparing compressed dna sequences, CoRR abs/1107.3593, 2011.
-
(2011)
-
-
Eppstein, D.1
Goodrich, M.T.2
Baldi, P.3
-
25
-
-
78650575522
-
Straggler identification in round-trip data streams via newton's identities and invertible bloom filters
-
Eppstein D., Goodrich M.T. Straggler identification in round-trip data streams via newton's identities and invertible bloom filters. IEEE Trans. Knowl. Data Eng. 2011, 23(2):297-306.
-
(2011)
IEEE Trans. Knowl. Data Eng.
, vol.23
, Issue.2
, pp. 297-306
-
-
Eppstein, D.1
Goodrich, M.T.2
-
26
-
-
84857084485
-
Towards secure bioinformatics services (short paper)
-
Springer-Verlag, Berlin, Heidelberg, Proceedings of the 15th International Conference on Financial Cryptography and Data Security
-
Franz M., Deiseroth B., Hamacher K., Jha S., Katzenbeisser S., Schröder H. Towards secure bioinformatics services (short paper). FC'11 2012, 276-283. Springer-Verlag, Berlin, Heidelberg.
-
(2012)
FC'11
, pp. 276-283
-
-
Franz, M.1
Deiseroth, B.2
Hamacher, K.3
Jha, S.4
Katzenbeisser, S.5
Schröder, H.6
-
27
-
-
0031743421
-
Profile hidden Markov models
-
Eddy S.R. Profile hidden Markov models. Bioinformatics 1998, 14(9):755-763.
-
(1998)
Bioinformatics
, vol.14
, Issue.9
, pp. 755-763
-
-
Eddy, S.R.1
-
28
-
-
80755143980
-
Countering Gattaca: efficient and secure testing of fully-sequenced human genomes
-
ACM, New York, NY, USA, Proceedings of the 18th ACM Conference on Computer and Communications Security
-
Baldi P., Baronio R., De Cristofaro E., Gasti P., Tsudik G. Countering Gattaca: efficient and secure testing of fully-sequenced human genomes. CCS '11 2011, 691-702. ACM, New York, NY, USA.
-
(2011)
CCS '11
, pp. 691-702
-
-
Baldi, P.1
Baronio, R.2
De Cristofaro, E.3
Gasti, P.4
Tsudik, G.5
-
29
-
-
84869161106
-
GenoDroid: are privacy-preserving genomic tests ready for prime time?
-
ACM, New York, NY, USA, Proceedings of the 2012 ACM Workshop on Privacy in the Electronic Society
-
De Cristofaro E., Faber S., Gasti P., Tsudik G. GenoDroid: are privacy-preserving genomic tests ready for prime time?. WPES '12 2012, 97-108. ACM, New York, NY, USA.
-
(2012)
WPES '12
, pp. 97-108
-
-
De Cristofaro, E.1
Faber, S.2
Gasti, P.3
Tsudik, G.4
-
30
-
-
84889057699
-
Secure genomic testing with size- and position-hiding private substring matching
-
ACM, New York, NY, USA, Proceedings of the 12th ACM Workshop on Privacy in the Electronic Society
-
De Cristofaro E., Faber S., Tsudik G. Secure genomic testing with size- and position-hiding private substring matching. WPES '13 2013, 107-118. ACM, New York, NY, USA.
-
(2013)
WPES '13
, pp. 107-118
-
-
De Cristofaro, E.1
Faber, S.2
Tsudik, G.3
-
31
-
-
84938669388
-
Inference control for privacy-preserving genome matching
-
CoRR abs/1405.0205
-
F. Kerschbaum, M. Beck, D. Schönfeld, Inference control for privacy-preserving genome matching, CoRR abs/1405.0205, 2014.
-
(2014)
-
-
Kerschbaum, F.1
Beck, M.2
Schönfeld, D.3
-
32
-
-
80955157888
-
Can homomorphic encryption be practical?
-
ACM, New York, NY, USA, Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop
-
Naehrig M., Lauter K., Vaikuntanathan V. Can homomorphic encryption be practical?. CCSW '11 2011, 113-124. ACM, New York, NY, USA. 10.1145/2046660.2046682.
-
(2011)
CCSW '11
, pp. 113-124
-
-
Naehrig, M.1
Lauter, K.2
Vaikuntanathan, V.3
-
33
-
-
84856847778
-
Secure management of biomedical data with cryptographic hardware
-
Canim M., Kantarcioglu M., Malin B. Secure management of biomedical data with cryptographic hardware. Trans. Info. Tech. Biomed. 2012, 16(1):166-175.
-
(2012)
Trans. Info. Tech. Biomed.
, vol.16
, Issue.1
, pp. 166-175
-
-
Canim, M.1
Kantarcioglu, M.2
Malin, B.3
-
34
-
-
84904122785
-
AU2EU: privacy-preserving matching of DNA sequences
-
in: D. Naccache, D. Sauveron (Eds.), Information Security Theory and Practice, Securing the Internet of Things, Lecture Notes in Computer Science
-
T. Ignatenko, M. Petkovic, AU2EU: privacy-preserving matching of DNA sequences, in: D. Naccache, D. Sauveron (Eds.), Information Security Theory and Practice, Securing the Internet of Things, Lecture Notes in Computer Science, vol. 8501, 2014, pp. 180-189.
-
(2014)
, vol.8501
, pp. 180-189
-
-
Ignatenko, T.1
Petkovic, M.2
-
35
-
-
0029307102
-
The context-tree weighting method: basic properties
-
Willems F.M.J., Shtarkov Y., Tjalkens T. The context-tree weighting method: basic properties. IEEE Trans. Inf. Theory 1995, 41(3):653-664. 10.1109/18.382012.
-
(1995)
IEEE Trans. Inf. Theory
, vol.41
, Issue.3
, pp. 653-664
-
-
Willems, F.M.J.1
Shtarkov, Y.2
Tjalkens, T.3
-
36
-
-
84905233012
-
Scalable privacy-preserving data sharing methodology for genome-wide association studies
-
Yu F., Fienberg S.E., Slavkovic A.B., Uhler C. Scalable privacy-preserving data sharing methodology for genome-wide association studies. J. Biomed. Inform. 2014, (0).
-
(2014)
J. Biomed. Inform.
-
-
Yu, F.1
Fienberg, S.E.2
Slavkovic, A.B.3
Uhler, C.4
-
37
-
-
50849101381
-
Resolving individuals contributing trace amounts of DNA to highly complex mixtures using high-density SNP genotyping microarrays
-
Homer N., Szelinger S., Redman M., Duggan D., Tembe W., Muehling J., Pearson J.V., Stephan D.A., Nelson S.F., Craig D.W. Resolving individuals contributing trace amounts of DNA to highly complex mixtures using high-density SNP genotyping microarrays. PLoS Genet. 2008, 4(8):e1000167.
-
(2008)
PLoS Genet.
, vol.4
, Issue.8
, pp. e1000167
-
-
Homer, N.1
Szelinger, S.2
Redman, M.3
Duggan, D.4
Tembe, W.5
Muehling, J.6
Pearson, J.V.7
Stephan, D.A.8
Nelson, S.F.9
Craig, D.W.10
-
38
-
-
69349086735
-
Genomic privacy and limits of individual detection in a pool
-
Sankararaman S., Obozinski G., Jordan M.I., Halperin E. Genomic privacy and limits of individual detection in a pool. Nat. Genet. 2009, 41(9):965-967. 10.1038/ng.436.
-
(2009)
Nat. Genet.
, vol.41
, Issue.9
, pp. 965-967
-
-
Sankararaman, S.1
Obozinski, G.2
Jordan, M.I.3
Halperin, E.4
-
39
-
-
70350632730
-
A new statistic and its power to infer membership in a genome-wide association study using genotype frequencies
-
Jacobs K.B., Yeager M., Wacholder S., Craig D., Kraft P., Hunter D.J., Paschal J., Manolio T.A., Tucker M., Hoover R.N., Thomas G.D., Chanock S.J., Chatterjee N. A new statistic and its power to infer membership in a genome-wide association study using genotype frequencies. Nat. Genet. 2009, 41(11):1253-1257. 10.1038/ng.455.
-
(2009)
Nat. Genet.
, vol.41
, Issue.11
, pp. 1253-1257
-
-
Jacobs, K.B.1
Yeager, M.2
Wacholder, S.3
Craig, D.4
Kraft, P.5
Hunter, D.J.6
Paschal, J.7
Manolio, T.A.8
Tucker, M.9
Hoover, R.N.10
Thomas, G.D.11
Chanock, S.J.12
Chatterjee, N.13
-
40
-
-
73449105071
-
The limits of individual identification from sample allele frequencies: theory and statistical analysis
-
Visscher P.M., Hill W.G. The limits of individual identification from sample allele frequencies: theory and statistical analysis. PLoS Genet. 2009, 5(10):e1000628. 10.1371/journal.pgen.1000628.
-
(2009)
PLoS Genet.
, vol.5
, Issue.10
, pp. e1000628
-
-
Visscher, P.M.1
Hill, W.G.2
-
41
-
-
74049130896
-
Learning your identity and disease from research papers: information leaks in genome wide association study
-
ACM, New York, NY, USA, Proceedings of the 16th Springer Conference on Computer and Communications Security
-
Wang R., Li Y.F., Wang X., Tang H., Zhou X. Learning your identity and disease from research papers: information leaks in genome wide association study. CCS '09 2009, 534-544. ACM, New York, NY, USA. 10.1145/1653662.1653726.
-
(2009)
CCS '09
, pp. 534-544
-
-
Wang, R.1
Li, Y.F.2
Wang, X.3
Tang, H.4
Zhou, X.5
-
42
-
-
80052975332
-
To release or not to release: evaluating information leaks in aggregate human-genome data
-
Springer, Berlin, Heidelberg, V. Atluri, C. Diaz (Eds.) Computer Security - ESORICS 2011
-
Zhou X., Peng B., Li Y., Chen Y., Tang H., Wang X. To release or not to release: evaluating information leaks in aggregate human-genome data. Lecture Notes in Computer Science 2011, vol. 6879:607-627. Springer, Berlin, Heidelberg. 10.1007/978-3-642-23822-2-33. V. Atluri, C. Diaz (Eds.).
-
(2011)
Lecture Notes in Computer Science
, vol.6879
, pp. 607-627
-
-
Zhou, X.1
Peng, B.2
Li, Y.3
Chen, Y.4
Tang, H.5
Wang, X.6
-
43
-
-
84941628486
-
Deterministic identification of specific individuals from GWAS results
-
R. Cai, Z. Hao, M. Winslett, X. Xiao, Y. Yang, Z. Zhang, S. Zhou, Deterministic identification of specific individuals from GWAS results, Bioinformatics. doi:10.1093/bioinformatics/btv018.
-
Bioinformatics
-
-
Cai, R.1
Hao, Z.2
Winslett, M.3
Xiao, X.4
Yang, Y.5
Zhang, Z.6
Zhou, S.7
-
44
-
-
33746335051
-
Differential privacy
-
Springer, Berlin, Heidelberg, M. Bugliesi, B. Preneel, V. Sassone, I. Wegener (Eds.) Automata, Languages and Programming
-
Dwork C. Differential privacy. Lecture Notes in Computer Science 2006, vol. 4052:1-12. Springer, Berlin, Heidelberg. M. Bugliesi, B. Preneel, V. Sassone, I. Wegener (Eds.).
-
(2006)
Lecture Notes in Computer Science
, vol.4052
, pp. 1-12
-
-
Dwork, C.1
-
45
-
-
84905192776
-
Privacy-preserving data sharing for genome-wide association studies
-
Uhler C., Slavkovic A.B., Fienberg S.E. Privacy-preserving data sharing for genome-wide association studies. J. Privacy Confidentiality 2013, 5(1):137-166.
-
(2013)
J. Privacy Confidentiality
, vol.5
, Issue.1
, pp. 137-166
-
-
Uhler, C.1
Slavkovic, A.B.2
Fienberg, S.E.3
-
46
-
-
84995401548
-
Privacy-preserving data exploration in genome-wide association studies
-
ACM, New York, NY, USA, Proceedings of the 19th Springer SIGKDD International Conference on Knowledge Discovery and Data Mining
-
Johnson A., Shmatikov V. Privacy-preserving data exploration in genome-wide association studies. KDD '13 2013, 1079-1087. ACM, New York, NY, USA. 10.1145/2487575.2487687.
-
(2013)
KDD '13
, pp. 1079-1087
-
-
Johnson, A.1
Shmatikov, V.2
-
47
-
-
84964313111
-
Scalable privacy-preserving data sharing methodology for genome-wide association studies: an application to iDASH healthcare privacy protection challenge
-
Yu F., Ji Z. Scalable privacy-preserving data sharing methodology for genome-wide association studies: an application to iDASH healthcare privacy protection challenge. BMC Med. Inf. Decis. Making 2014, 14(S-1):S3. 10.1186/1472-6947-14-S1-S3.
-
(2014)
BMC Med. Inf. Decis. Making
, vol.14
, Issue.S 1
, pp. S3
-
-
Yu, F.1
Ji, Z.2
-
48
-
-
84964313265
-
A community assessment of privacy preserving techniques for human genomes
-
Jiang X., Zhao Y., Fang X., Malin B., Wang S., Ohno-Machado L., Tang H. A community assessment of privacy preserving techniques for human genomes. BMC Med. Inf. Decis. Making 2014, 14(S-1):S1. 10.1186/1472-6947-14-S1-S1.
-
(2014)
BMC Med. Inf. Decis. Making
, vol.14
, Issue.S 1
, pp. S1
-
-
Jiang, X.1
Zhao, Y.2
Fang, X.3
Malin, B.4
Wang, S.5
Ohno-Machado, L.6
Tang, H.7
-
49
-
-
84938572122
-
Choosing blindly but wisely: differentially private solicitation of dna datasets for disease marker discovery
-
Zhao Y., Wang X., Jiang X., Ohno-Machado L., Tang H. Choosing blindly but wisely: differentially private solicitation of dna datasets for disease marker discovery. J. Am. Med. Inform. Assoc. 2015, 22(1):100-108. 10.1136/amiajnl-2014-003043.
-
(2015)
J. Am. Med. Inform. Assoc.
, vol.22
, Issue.1
, pp. 100-108
-
-
Zhao, Y.1
Wang, X.2
Jiang, X.3
Ohno-Machado, L.4
Tang, H.5
-
50
-
-
85013889444
-
Privacy-preserving processing of raw genomic data
-
in: 8th Data Privacy Management (DPM 2013) International Workshop (in conjunction with ESORICS 2013)
-
E. Ayday, J.L. Raisaro, U. Hengartner, A. Molyneaux, J.-P. Hubaux, Privacy-preserving processing of raw genomic data, in: 8th Data Privacy Management (DPM 2013) International Workshop (in conjunction with ESORICS 2013), 2013.
-
(2013)
-
-
Ayday, E.1
Raisaro, J.L.2
Hengartner, U.3
Molyneaux, A.4
Hubaux, J.-P.5
-
51
-
-
33746639153
-
Scalable management of personal genomic data
-
Adida B., Kohane I., secure Geneping: scalable management of personal genomic data. BMC Genomics 2006, 7(1):1-10.
-
(2006)
BMC Genomics
, vol.7
, Issue.1
, pp. 1-10
-
-
Adida, B.1
Kohane, I.2
secure, G.3
|