-
1
-
-
85025126688
-
Privacy-preserving computation of disease risk by using genomic, clinical, and environmental data
-
Berkeley, CA, USA. USENIX Association
-
Ayday,E. et al. (2013). Privacy-preserving computation of disease risk by using genomic, clinical, and environmental data. In: Proceedings of the 2013 USENIX Conference on Safety, Security, Privacy and Interoperability of Health Information Technologies, HealthTech '13, Berkeley, CA, USA. USENIX Association, p. 1.
-
(2013)
Proceedings of the 2013 USENIX Conference on Safety,Security, Privacy and Interoperability of Health Information Technologies, HealthTech '13
, pp. 1
-
-
Ayday, E.1
-
2
-
-
80755143980
-
Countering gattaca: Efficient and secure testing of fullysequenced human genomes
-
New York, NY, USA. ACM
-
Baldi,P. et al. (2011). Countering gattaca: efficient and secure testing of fullysequenced human genomes. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS '11, New York, NY, USA. ACM, pp. 691-702.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security CCS '11
, pp. 691-702
-
-
Baldi, P.1
-
3
-
-
84874111575
-
The microbiome explored: Recent insights and future challenges
-
Blaser,M. et al. (2013) The microbiome explored: recent insights and future challenges. Nat. Rev. Microbiol, 11, 213-7.
-
(2013)
Nat. Rev. Microbiol
, vol.11
, pp. 213-217
-
-
Blaser, M.1
-
4
-
-
33746921634
-
The personal genome project
-
2005-0030
-
Church,G.M. (2005) The personal genome project. Mol. Syst. Biol., 1, 2005.0030
-
(2005)
Mol. Syst. Biol.
, vol.1
-
-
Church, G.M.1
-
5
-
-
79959306358
-
Secure efficient multiparty computing of multivariate polynomials and applications
-
Springer
-
Dachman-Soled,D. et al. (2011). Secure efficient multiparty computing of multivariate polynomials and applications. In: Applied Cryptography and Network Security, pp. 130-46. Springer.
-
(2011)
Applied Cryptography and Network Security
, pp. 130-146
-
-
Dachman-Soled, D.1
-
6
-
-
77950904616
-
Forensic identification using skin bacterial communities
-
Fierer,N. et al. (2010) Forensic identification using skin bacterial communities. Proc. Natl. Acad. Sci. USA, 107, 6477-81.
-
(2010)
Proc. Natl. Acad. Sci. USA
, vol.107
, pp. 6477-6481
-
-
Fierer, N.1
-
7
-
-
84930649544
-
Identifying personal microbiomes using metagenomic codes
-
Franzosa,E. et al. (2015) Identifying personal microbiomes using metagenomic codes. Proc. Natl. Acad. Sci. USA, 112, E2930-8.
-
(2015)
Proc. Natl. Acad. Sci. USA
, vol.112
, pp. E2930-E2938
-
-
Franzosa, E.1
-
8
-
-
85055873696
-
Privacy in pharmacogenetics: An end-to-end case study of personalized warfarin dosing
-
USENIX Association
-
Fredrikson,M. et al. (2014). Privacy in pharmacogenetics: an end-to-end case study of personalized warfarin dosing. In: 23rd USENIX Security Symposium (USENIX Security 14), USENIX Association, pp. 17-32.
-
(2014)
23rd USENIX Security Symposium (USENIX Security 14)
, pp. 17-32
-
-
Fredrikson, M.1
-
9
-
-
79959655657
-
Dnaclust: Accurate and efficient clustering of phylogenetic marker genes
-
Ghodsi,M. et al. (2011) Dnaclust: accurate and efficient clustering of phylogenetic marker genes. BMC Bioinformatics, 12, 271.
-
(2011)
BMC Bioinformatics
, vol.12
, pp. 271
-
-
Ghodsi, M.1
-
11
-
-
84914127581
-
Faster secure two-party computation using garbled circuits
-
Berkeley, CA, USA. USENIX Association
-
Huang,Y. et al. (2011). Faster secure two-party computation using garbled circuits. In: Proceedings of the 20th USENIX Conference on Security, SEC'11, Berkeley, CA, USA. USENIX Association, pp. 35-35.
-
(2011)
Proceedings of the 20th USENIX Conference on Security, SEC'11
, pp. 35
-
-
Huang, Y.1
-
12
-
-
84875595667
-
A new way to protect privacy in large-scale genomewide association studies
-
Kamm,L. et al. (2013) A new way to protect privacy in large-scale genomewide association studies. Bioinformatics, 29, 886-93.
-
(2013)
Bioinformatics
, vol.29
, pp. 886-893
-
-
Kamm, L.1
-
13
-
-
49049099825
-
Improved garbled circuit: Free XOR gates and applications
-
Springer
-
Kolesnikov,V. and Schneider,T. (2008) Improved garbled circuit: free XOR gates and applications. In: Automata, Languages and Programming, pp. 486-98. Springer.
-
(2008)
Automata, Languages and Programming
, pp. 486-498
-
-
Kolesnikov, V.1
Schneider, T.2
-
14
-
-
84926666038
-
Private computation on encrypted genomic data
-
Springer
-
Lauter,K. et al. (2014) Private computation on encrypted genomic data. In: Progress in Cryptology-LATINCRYPT 2014, pp. 3-27. Springer.
-
(2014)
Progress in Cryptology-LATINCRYPT 2014
, pp. 3-27
-
-
Lauter, K.1
-
16
-
-
34748848639
-
The NCBI dbgap database of genotypes and phenotypes
-
Mailman,M.D. et al. (2007) The NCBI dbgap database of genotypes and phenotypes. Nat. Genet., 30, 1181-86.
-
(2007)
Nat. Genet.
, vol.30
, pp. 1181-1186
-
-
Mailman, M.D.1
-
17
-
-
85084163840
-
Fairplay-secure two-party computation system
-
Berkeley, CA, USA. USENIX Association
-
Malkhi,D. et al. (2004) Fairplay-secure two-party computation system. In: Proceedings of the 13th Conference on USENIX Security Symposium, SSYM'04, Berkeley, CA, USA. USENIX Association, p. 20.
-
(2004)
Proceedings of the 13th Conference on USENIX Security Symposium,SSYM'04
, pp. 20
-
-
Malkhi, D.1
-
18
-
-
84910663111
-
Controlled functional encryption
-
New York, NY, USA. ACM
-
Naveed,M. et al. (2014). Controlled functional encryption. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, New York, NY, USA. ACM, pp. 1280-1291.
-
(2014)
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security,CCS '14
, pp. 1280-1291
-
-
Naveed, M.1
-
19
-
-
84888987660
-
Privacy-preserving matrix factorization
-
New York, NY, USA. ACM
-
Nikolaenko,V. et al. (2013). Privacy-preserving matrix factorization. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS '13, New York, NY, USA. ACM, pp. 801-812.
-
(2013)
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security,CCS '13
, pp. 801-812
-
-
Nikolaenko, V.1
-
20
-
-
84888865593
-
Differential abundance analysis for microbial marker-gene surveys
-
Paulson,J.N. et al. (2013) Differential abundance analysis for microbial marker-gene surveys. Nat. Methods, 10, 1200-2.
-
(2013)
Nat. Methods
, vol.10
, pp. 1200-1202
-
-
Paulson, J.N.1
-
21
-
-
84912109726
-
Diarrhea in young children from low-income countries leads to large-scale alterations in intestinal microbiota composition
-
Pop,M. et al. (2014) Diarrhea in young children from low-income countries leads to large-scale alterations in intestinal microbiota composition. Genome Biol., 15, R76.
-
(2014)
Genome Biol.
, vol.15
, pp. R76
-
-
Pop, M.1
-
22
-
-
57049083569
-
Privacy preserving error resilient DNA searching through oblivious automata
-
New York, NY, USA. ACM
-
Troncoso-Pastoriza,J.R. et al. (2007). Privacy preserving error resilient DNA searching through oblivious automata. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS '07, New York, NY, USA. ACM, pp. 519-528.
-
(2007)
Proceedings of the rfvn1 14th ACM Conference on Computer and Communications Security,CCS '07
, pp. 519-528
-
-
Troncoso-Pastoriza, J.R.1
-
23
-
-
84976515741
-
The human microbiome project: Exploring the microbial part of ourselves in a changing world
-
Turnbaugh,P.J. et al. (2007). The human microbiome project: exploring the microbial part of ourselves in a changing world. Nature, 449, 801-10.
-
(2007)
Nature
, vol.449
, pp. 801-810
-
-
Turnbaugh, P.J.1
-
24
-
-
58749112734
-
A core gut microbiome in obese and lean twins
-
Turnbaugh,P.J. et al. (2009) A core gut microbiome in obese and lean twins. Nature, 457, 480-4.
-
(2009)
Nature
, vol.457
, pp. 480-484
-
-
Turnbaugh, P.J.1
-
26
-
-
84945241362
-
Two halves make a whole
-
Springer
-
Zahur,S. et al. (2015). Two halves make a whole. In: Advances in Cryptology-EUROCRYPT 2015, pp. 220-50. Springer.
-
(2015)
Advances in Cryptology-EUROCRYPT
, vol.2015
, pp. 220-250
-
-
Zahur, S.1
|