-
2
-
-
33748324558
-
Energy-aware lossless data compression
-
Barr, K. C. And Asanovic, K. (2006) Energy-aware lossless data compression. ACM Trans. Comput. Syst., 24, 250-291.
-
(2006)
ACM Trans. Comput. Syst.
, vol.24
, pp. 250-291
-
-
Barr, K.C.1
Asanovic, K.2
-
3
-
-
27344458404
-
On prediction using variable order Markov models
-
Begleiter, R. et al. (2004) On prediction using variable order Markov models. J. Artif. Intell. Res., 22, 385-421.
-
(2004)
J. Artif. Intell. Res.
, vol.22
, pp. 385-421
-
-
Begleiter, R.1
-
5
-
-
0141473270
-
Fast variants of RSA
-
Boneh, D. And Shacham, H. (2002) Fast variants of RSA. CryptoBytes, 5, 1-9.
-
(2002)
CryptoBytes
, vol.5
, pp. 1-9
-
-
Boneh, D.1
Shacham, H.2
-
6
-
-
84905174579
-
Private predictive analysis on encrypted medical data
-
Bos, J. W. et al. (2014) Private predictive analysis on encrypted medical data. J. Biomed. Inform., 50, 234-243.
-
(2014)
J. Biomed. Inform.
, vol.50
, pp. 234-243
-
-
Bos, J.W.1
-
8
-
-
84899651713
-
Efficient fully homomorphic encryption from (standard) LWE
-
Brakerski, Z. And Vaikuntanathan, V. (2011) Efficient fully homomorphic encryption from (standard) LWE. SIAM J. Comput., 43, 831-871.
-
(2011)
SIAM J. Comput.
, vol.43
, pp. 831-871
-
-
Brakerski, Z.1
Vaikuntanathan, V.2
-
9
-
-
73149103718
-
Prioritizing GWAS results: A review of statistical methods and recommendations for their application
-
Cantor, R. M. et al. (2010) Prioritizing GWAS results: A review of statistical methods and recommendations for their application. Am. J. Hum. Genet., 86, 6-22.
-
(2010)
Am. J. Hum. Genet.
, vol.86
, pp. 6-22
-
-
Cantor, R.M.1
-
10
-
-
84931028807
-
Cloud cover protects gene data
-
Check Hayden, E. (2015) Cloud cover protects gene data. Nature, 519, 400-401.
-
(2015)
Nature
, vol.519
, pp. 400-401
-
-
Check Hayden, E.1
-
12
-
-
77952574849
-
Uncovering the roles of rare variants in common disease through whole-genome sequencing
-
Cirulli, E. T. And Goldstein, D. B. (2010) Uncovering the roles of rare variants in common disease through whole-genome sequencing. Nat. Rev. Genet., 11, 415-425.
-
(2010)
Nat. Rev. Genet.
, vol.11
, pp. 415-425
-
-
Cirulli, E.T.1
Goldstein, D.B.2
-
15
-
-
43949118608
-
A survey of homomorphic encryption for nonspecialists
-
Fontaine, C. And Galand, F. (2007) A survey of homomorphic encryption for nonspecialists. EURASIP J. Inf. Secur., 2007, 1-15.
-
(2007)
EURASIP J. Inf. Secur.
, vol.2007
, pp. 1-15
-
-
Fontaine, C.1
Galand, F.2
-
16
-
-
79957974657
-
Implementing gentry's fully-homomorphic encryption scheme
-
Patterson, K. E. (ed.) . Springer, Heidelberg
-
Gentry, C. And Halevi, S. (2011) Implementing gentry's fully-homomorphic encryption scheme. In: Patterson, K. E. (ed.) Advances in Cryptology-EUROCRYPT. Springer, Heidelberg, pp. 129-148.
-
(2011)
Advances in Cryptology-EUROCRYPT
, pp. 129-148
-
-
Gentry, C.1
Halevi, S.2
-
17
-
-
33745655621
-
A new security proof for Damgard's ElGamal
-
Gjøsteen, K. (2006) A new security proof for Damgard's ElGamal. In: Topics in Cryptology-CT-RSA., vol. 3860, pp. 150-158.
-
(2006)
Topics in Cryptology-CT-RSA
, vol.3860
, pp. 150-158
-
-
Gjøsteen, K.1
-
18
-
-
84876012553
-
ML confidential: Machine learning on encrypted data
-
Springer, Heidelberg
-
Graepel, T. et al. (2013) ML confidential: machine learning on encrypted data. In: Information Security and Cryptology-ICISC 2012. Springer, Heidelberg, pp. 1-21.
-
(2013)
Information Security and Cryptology-ICISC 2012
, pp. 1-21
-
-
Graepel, T.1
-
19
-
-
84872459720
-
Identifying personal genomes by surname inference
-
Gymrek, M. et al. (2013) Identifying personal genomes by surname inference. Science, 339, 321-324.
-
(2013)
Science
, vol.339
, pp. 321-324
-
-
Gymrek, M.1
-
20
-
-
84875982465
-
Genome-wide testing of putative functional exonic variants in relationship with breast and prostate cancer risk in a multiethnic population
-
Haiman, C. A. et al. (2013) Genome-wide testing of putative functional exonic variants in relationship with breast and prostate cancer risk in a multiethnic population. PLoS Genet., 9, e1003419.
-
(2013)
PLoS Genet.
, vol.9
, pp. e1003419
-
-
Haiman, C.A.1
-
21
-
-
13444266370
-
Online Mendelian Inheritance in Man (OMIM), a knowledgebase of human genes and genetic disorders
-
Hamosh, A. et al. (2005) Online Mendelian Inheritance in Man (OMIM), a knowledgebase of human genes and genetic disorders. Nucleic Acids Res., 33, D514-D517.
-
(2005)
Nucleic Acids Res.
, vol.33
, pp. D514-D517
-
-
Hamosh, A.1
-
22
-
-
0001325611
-
Wald's test as applied to hypotheses in logit analysis
-
Hauck, W. W., Jr and Donner, A. (1977) Wald's test as applied to hypotheses in logit analysis. J. Am. Stat. Assoc., 72, 851-853.
-
(1977)
J. Am. Stat. Assoc.
, vol.72
, pp. 851-853
-
-
Hauck, W.W.1
Donner, A.2
-
23
-
-
50849101381
-
Resolving individuals contributing trace amounts of DNA to highly complex mixtures using high-density SNP genotyping microarrays
-
Homer, N. et al. (2008) Resolving individuals contributing trace amounts of DNA to highly complex mixtures using high-density SNP genotyping microarrays. PLoS Genet., 4, e1000167.
-
(2008)
PLoS Genet.
, vol.4
, pp. e1000167
-
-
Homer, N.1
-
25
-
-
84904403560
-
Reducing false-positive incidental findings with ensemble genotyping and logistic regression based variant filtering methods
-
Hwang, K.-B. et al. (2014) Reducing false-positive incidental findings with ensemble genotyping and logistic regression based variant filtering methods. Hum. Mutat., 35, 936-944.
-
(2014)
Hum. Mutat.
, vol.35
, pp. 936-944
-
-
Hwang, K.-B.1
-
26
-
-
84964313265
-
A community assessment of privacy preserving techniques on human genome data
-
Jiang, X. et al. (2014) A community assessment of privacy preserving techniques on human genome data. BMC, 14(Suppl 1), S1.
-
(2014)
BMC
, vol.14
, pp. S1
-
-
Jiang, X.1
-
27
-
-
84875595667
-
A new way to protect privacy in large-scale genomewide association studies
-
Kamm, L. et al. (2013) A new way to protect privacy in large-scale genomewide association studies. Bioinformatics, 29, 886-93.
-
(2013)
Bioinformatics
, vol.29
, pp. 886-893
-
-
Kamm, L.1
-
29
-
-
3042849144
-
Genomic research and human subject privacy
-
Lin, Z. et al. (2004) Genomic research and human subject privacy. Science, 305, 183.
-
(2004)
Science
, vol.305
, pp. 183
-
-
Lin, Z.1
-
30
-
-
84890260477
-
Whole-exome sequencing of 2 000 Danish individuals and the role of rare coding variants in type 2 diabetes
-
Lohmueller, K. E. et al. (2013) Whole-exome sequencing of 2 000 Danish individuals and the role of rare coding variants in type 2 diabetes. Am. J. Hum. Genet., 93, 1072-1086.
-
(2013)
Am. J. Hum. Genet.
, vol.93
, pp. 1072-1086
-
-
Lohmueller, K.E.1
-
31
-
-
2942522665
-
How (not) to protect genomic data privacy in a distributed network: Using trail re-identification to evaluate and design anonymity protection systems
-
Malin, B. And Sweeney, L. (2004) How (not) to protect genomic data privacy in a distributed network: using trail re-identification to evaluate and design anonymity protection systems. J. Biomed. Inform., 37, 179-192.
-
(2004)
J. Biomed. Inform.
, vol.37
, pp. 179-192
-
-
Malin, B.1
Sweeney, L.2
-
33
-
-
0442293931
-
Efficient Monte Carlo Methods for Conditional Logistic Regression
-
Mehta, C. R. et al. (2000) Efficient Monte Carlo Methods for Conditional Logistic Regression. J. Am. Stat. Assoc., 95, 99-108.
-
(2000)
J. Am. Stat. Assoc.
, vol.95
, pp. 99-108
-
-
Mehta, C.R.1
-
34
-
-
0029022967
-
Exact logistic regression: Theory and examples
-
Mehta, C. R. And Patel, N. R. (1995) Exact logistic regression: Theory and examples. Stat. Med., 14, 2143-2160.
-
(1995)
Stat. Med.
, vol.14
, pp. 2143-2160
-
-
Mehta, C.R.1
Patel, N.R.2
-
35
-
-
80955157888
-
Can homomorphic encryption be practical?
-
ACM Press, New York, NY, USA
-
Naehrig, M. et al. (2011) Can homomorphic encryption be practical? In: Proceedings of the 3rd ACM workshop on Cloud computing security workshop-CCSW '11. ACM Press, New York, NY, USA, p. 113.
-
(2011)
Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop-CCSW '11
, pp. 113
-
-
Naehrig, M.1
-
37
-
-
84875312984
-
Low concordance of multiple variant-calling pipelines: Practical implications for exome and genome sequencing
-
O'Rawe, J. et al. (2013) Low concordance of multiple variant-calling pipelines: practical implications for exome and genome sequencing. Genome med, 5, 28.
-
(2013)
Genome Med
, vol.5
, pp. 28
-
-
O'Rawe, J.1
-
38
-
-
84863115554
-
IDASH. Integrating data for analysis, anonymization, and sharing
-
Ohno-Machado, L. et al. (2012) iDASH. Integrating data for analysis, anonymization, and sharing. J. Am. Med. Informatics Assoc., 19, 196-201.
-
(2012)
J. Am. Med. Informatics Assoc.
, vol.19
, pp. 196-201
-
-
Ohno-Machado, L.1
-
39
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
Springer Verlagpp
-
Paillier, P. (1999) Public-key cryptosystems based on composite degree residuosity classes. In: Advances in Cryptology-EUROCRYPT'99, LNCS 1592, Springer Verlagpp. 223-238.
-
(1999)
Advances in Cryptology-EUROCRYPT'99, LNCS
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
40
-
-
84959909911
-
-
(12 September 2015 date last accessed)
-
Pavlov, I. (2007) 7zip file archive application. https://ford. ischool. utexas. edu/ handle/2081/8999 (12 September 2015, date last accessed).
-
(2007)
7zip File Archive Application
-
-
Pavlov, I.1
-
41
-
-
80054975975
-
Deep resequencing of GWAS loci identifies independent rare variants associated with inflammatory bowel disease
-
Rivas, M. A. et al. (2011) Deep resequencing of GWAS loci identifies independent rare variants associated with inflammatory bowel disease. Nat. Genet., 43, 1066-1073.
-
(2011)
Nat. Genet.
, vol.43
, pp. 1066-1073
-
-
Rivas, M.A.1
-
43
-
-
84899638695
-
Severe osteoarthritis of the hand associates with common variants within the ALDH1A2 gene and with rare variants at 1p31
-
Styrkarsdottir, U. et al. (2014) Severe osteoarthritis of the hand associates with common variants within the ALDH1A2 gene and with rare variants at 1p31. Nat. Genet., 46, 498-502.
-
(2014)
Nat. Genet.
, vol.46
, pp. 498-502
-
-
Styrkarsdottir, U.1
-
44
-
-
84959898398
-
Identifying participants in the personal genome project by name (A Re-identification experiment)
-
Harvard University, Cambridge, MA
-
Sweeney, L. et al. (2013) Identifying participants in the personal genome project by name (A Re-identification experiment). White Paper 1021-1. Data Privacy Lab, Harvard University, Cambridge, MA.
-
(2013)
White Paper 1021-1. Data Privacy Lab
-
-
Sweeney, L.1
-
46
-
-
84862909349
-
Five years of GWAS discovery
-
Visscher, P. M. et al. (2012) Five years of GWAS discovery. Am. J. Hum. Genet., 90, 7-24.
-
(2012)
Am. J. Hum. Genet.
, vol.90
, pp. 7-24
-
-
Visscher, P.M.1
-
47
-
-
74049130896
-
Learning your identity and disease from research papers
-
ACM Press, New York, NY, USA
-
Wang, R. et al. (2009) Learning your identity and disease from research papers. In: Proceedings of the 16th ACM conference on Computer and communications security-CCS '09. ACM Press, New York, NY, USA, pp. 534-544.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security-CCS '09
, pp. 534-544
-
-
Wang, R.1
-
48
-
-
84964314800
-
Differentially private genome data dissemination through top-down specialization
-
Wang, S. et al. (2014) Differentially private genome data dissemination through top-down specialization. BMC Med. Inform. Decis. Mak., 14, S2.
-
(2014)
BMC Med. Inform. Decis. Mak.
, vol.14
, pp. S2
-
-
Wang, S.1
-
49
-
-
84930733962
-
SecureMA: Protecting participant privacy in genetic association meta-analysis
-
Xie, W. et al. (2014) SecureMA: protecting participant privacy in genetic association meta-analysis. Bioinformatics, 30, 3334-3341.
-
(2014)
Bioinformatics
, vol.30
, pp. 3334-3341
-
-
Xie, W.1
-
50
-
-
84964313111
-
Scalable privacy-preserving data sharing methodology for genome-wide association studies: An application to iDASH healthcare privacy protection challenge
-
Yu, F. And Ji, Z. (2014) Scalable privacy-preserving data sharing methodology for genome-wide association studies: An application to iDASH healthcare privacy protection challenge. BMC Med. Inform. Decis. Mak., 14, S3.
-
(2014)
BMC Med. Inform. Decis. Mak.
, vol.14
, pp. S3
-
-
Yu, F.1
Ji, Z.2
-
51
-
-
84938572122
-
Choosing blindly but wisely: Differentially private solicitation of DNA datasets for disease marker discovery
-
Zhao, Y. et al. (2015) Choosing blindly but wisely: differentially private solicitation of DNA datasets for disease marker discovery. J. Am. Med. Inform. Assoc., 22, 100-108.
-
(2015)
J. Am. Med. Inform. Assoc.
, vol.22
, pp. 100-108
-
-
Zhao, Y.1
|