-
1
-
-
84893284162
-
PCF: A portable circuit format for scalable two-party secure computation
-
Kreuter B, Shelat A, Mood B, Butler KRB: PCF: A portable circuit format for scalable two-party secure computation. Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013. 2013, 321-336.
-
(2013)
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013
, pp. 321-336
-
-
Kreuter, B.1
Shelat, A.2
Mood, B.3
Butler, K.R.B.4
-
2
-
-
67149095078
-
Designing genome-wide association studies: Sample size, power, imputation, and the choice of genotyping chip
-
Spencer CC, Su Z, Donnelly P, Marchini J: Designing genome-wide association studies: sample size, power, imputation, and the choice of genotyping chip. PLoS genetics. 2009, 5 (5): 1000477-
-
(2009)
PLoS Genetics
, vol.5
, Issue.5
, pp. 1000477
-
-
Spencer, C.C.1
Su, Z.2
Donnelly, P.3
Marchini, J.4
-
3
-
-
84880059657
-
The electronic medical records and genomics (emerge) network: Past, present, and future
-
23743551 3795928
-
Gottesman O, Kuivaniemi H, Tromp G, Faucett WA, Li R, Manolio TA, Sanderson SC, Kannry J, Zinberg R, Basford MA, et al: The electronic medical records and genomics (emerge) network: past, present, and future. Genetics in Medicine. 2013, 15 (10): 761-771.
-
(2013)
Genetics in Medicine
, vol.15
, Issue.10
, pp. 761-771
-
-
Gottesman, O.1
Kuivaniemi, H.2
Tromp, G.3
Faucett, W.A.4
Li, R.5
Manolio, T.A.6
Sanderson, S.C.7
Kannry, J.8
Zinberg, R.9
Basford, M.A.10
-
4
-
-
84902383973
-
Pscanner: Patient-centered scalable national network for effectiveness research
-
24780722 4078293
-
Ohno-Machado L, Agha Z, Bell DS, Dahm L, Day ME, Doctor JN, Gabriel D, Kahlon MK, Kim KK, Hogarth M, et al: pscanner: patient-centered scalable national network for effectiveness research. Journal of the American Medical Informatics Association. 2014, 21 (4): 621-626.
-
(2014)
Journal of the American Medical Informatics Association
, vol.21
, Issue.4
, pp. 621-626
-
-
Ohno-Machado, L.1
Agha, Z.2
Bell, D.S.3
Dahm, L.4
Day, M.E.5
Doctor, J.N.6
Gabriel, D.7
Kahlon, M.K.8
Kim, K.K.9
Hogarth, M.10
-
5
-
-
84977260881
-
-
PCORnet: The National Patient-Centered Clinical Research Network
-
PCORnet: The National Patient-Centered Clinical Research Network. Available at http://hapmap.ncbi.nlm.nih.gov/hapmart.html.en
-
-
-
-
6
-
-
84977264340
-
-
NHIN visited on October 7
-
NHIN. visited on October 7, 2015, [ https://www.healthit.gov/policy-researchers-implementers/nationwide-health-information-network-nwhin ]
-
(2015)
-
-
-
7
-
-
84977269513
-
-
visited on March 9
-
CommonWell. visited on March 9, 2015, [ http://www.commonwellalliance.org/ ]
-
(2015)
CommonWell
-
-
-
8
-
-
84977263453
-
-
GaHIN. visited on March 9
-
GaHIN. visited on March 9, 2015, [ http://www.gahin.org/ ]
-
(2015)
-
-
-
9
-
-
84938669382
-
-
arXiv preprint arXiv:1405.1891
-
Naveed M, Ayday E, Clayton EW, Fellay J, Gunter CA, Hubaux J-P, Malin BA, Wang X: Privacy and security in the genomic era. 2014, arXiv preprint arXiv:1405.1891
-
(2014)
Privacy and Security in the Genomic Era
-
-
Naveed, M.1
Ayday, E.2
Clayton, E.W.3
Fellay, J.4
Gunter, C.A.5
Hubaux, J.-P.6
Malin, B.A.7
Wang, X.8
-
10
-
-
84977271543
-
-
HiPAA visited on March 9
-
HiPAA. visited on March 9, 2015, [ http://www.cms.hhs.gov/HIPAAGenInfo/ ]
-
(2015)
-
-
-
11
-
-
84977273781
-
-
NIH Genomic Data Sharing (GDS) Policy. visited on March 9
-
NIH Genomic Data Sharing (GDS) Policy. visited on March 9, 2015, [ http://gds.nih.gov/03policy2.html ]
-
(2015)
-
-
-
13
-
-
0020312165
-
Protocols for secure computations (extended abstract)
-
Yao AC-C: Protocols for secure computations (extended abstract). FOCS. 1982, 160-164.
-
(1982)
FOCS
, pp. 160-164
-
-
Yao, A.C.-C.1
-
14
-
-
33745556605
-
Calibrating noise to sensitivity in private data analysis
-
Dwork C, McSherry F, Nissim K, Smith A: Calibrating noise to sensitivity in private data analysis. TCC. 2006, 265-284.
-
(2006)
TCC
, pp. 265-284
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
16
-
-
84964314800
-
Differentially private genome data dissemination through top-down specialization
-
Wang S, Mohammed N, Chen R: Differentially private genome data dissemination through top-down specialization. BMC medical informatics and decision making. 2014, 14 (Suppl 1): 2-
-
(2014)
BMC Medical Informatics and Decision Making
, vol.14
, pp. 2
-
-
Wang, S.1
Mohammed, N.2
Chen, R.3
-
17
-
-
84900373713
-
Webglore: A web service for grid logistic regression
-
Jiang W, Li P, Wang S, Wu Y, Xue M, Ohno-Machado L, Jiang X: Webglore: a web service for grid logistic regression. Bioinformatics. 2013, 559-
-
(2013)
Bioinformatics
, pp. 559
-
-
Jiang, W.1
Li, P.2
Wang, S.3
Wu, Y.4
Xue, M.5
Ohno-Machado, L.6
Jiang, X.7
-
18
-
-
84878185145
-
Expectation propagation logistic regression (explorer): Distributed privacy-preserving online model learning
-
23562651 3676314
-
Wang S, Jiang X, Wu Y, Cui L, Cheng S, Ohno-Machado L: Expectation propagation logistic regression (explorer): distributed privacy-preserving online model learning. Journal of biomedical informatics. 2013, 46 (3): 480-496.
-
(2013)
Journal of Biomedical Informatics
, vol.46
, Issue.3
, pp. 480-496
-
-
Wang, S.1
Jiang, X.2
Wu, Y.3
Cui, L.4
Cheng, S.5
Ohno-Machado, L.6
-
19
-
-
84924133376
-
Grid multi-category response logistic models
-
25886151 4342889
-
Wu Y, Jiang X, Wang S, Jiang W, Li P, Ohno-Machado L: Grid multi-category response logistic models. BMC Medical Informatics and Decision Making. 2015, 15 (1): 10-
-
(2015)
BMC Medical Informatics and Decision Making
, vol.15
, Issue.1
, pp. 10
-
-
Wu, Y.1
Jiang, X.2
Wang, S.3
Jiang, W.4
Li, P.5
Ohno-Machado, L.6
-
20
-
-
84954210543
-
Webdisco: A web service for distributed cox model learning without patient-level data sharing
-
Lu C-L, Wang S, Ji Z, Wu Y, Xiong L, Jiang X, Ohno-Machado L: Webdisco: A web service for distributed cox model learning without patient-level data sharing. Journal of the American Medical Informatics Association. 2015, 083-
-
(2015)
Journal of the American Medical Informatics Association
, pp. 083
-
-
Lu, C.-L.1
Wang, S.2
Ji, Z.3
Wu, Y.4
Xiong, L.5
Jiang, X.6
Ohno-Machado, L.7
-
21
-
-
57049188348
-
Sharemind: A framework for fast privacy-preserving computations
-
Bogdanov D, Laur S, Willemson J: Sharemind: A framework for fast privacy-preserving computations. Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings. 2008, 192-206.
-
(2008)
Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings
, pp. 192-206
-
-
Bogdanov, D.1
Laur, S.2
Willemson, J.3
-
22
-
-
84863275770
-
Secure multi-party computation of boolean circuits with applications to privacy in on-line marketplaces
-
doi:10.1007/978-3-642-27954-626
-
Choi SG, Hwang K, Katz J, Malkin T, Rubenstein D: Secure multi-party computation of boolean circuits with applications to privacy in on-line marketplaces. Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27 - March 2, 2012. Proceedings. 2012, 416-432. doi:10.1007/978-3-642-27954-626
-
(2012)
Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27 - March 2, 2012. Proceedings
, pp. 416-432
-
-
Choi, S.G.1
Hwang, K.2
Katz, J.3
Malkin, T.4
Rubenstein, D.5
-
26
-
-
84959864390
-
HEALER: Homomorphic computation of ExAct Logistic rEgRession for secure rare disease variants analysis in GWAS
-
(accepted)
-
Wang S, Zhang Y, Dai W, Lauter K, Kim M, Tang Y, Xiong H, Jiang X: HEALER: Homomorphic computation of ExAct Logistic rEgRession for secure rare disease variants analysis in GWAS. Bioinformatics. 2015, (accepted)
-
(2015)
Bioinformatics
-
-
Wang, S.1
Zhang, Y.2
Dai, W.3
Lauter, K.4
Kim, M.5
Tang, Y.6
Xiong, H.7
Jiang, X.8
-
27
-
-
84982742460
-
SECRET: Secure Edit-distance Computation over homomoRphic Encrypted daTa
-
(accepted)
-
Zhang Y, Dai W, Wang S, Kim M, Lauter K, Sakuma J, Xiong H, Jiang X: SECRET: Secure Edit-distance Computation over homomoRphic Encrypted daTa. 5th Annual Translational Bioinformatics Conference, Tokyo, Japan. 2015, (accepted)
-
(2015)
5th Annual Translational Bioinformatics Conference, Tokyo, Japan
-
-
Zhang, Y.1
Dai, W.2
Wang, S.3
Kim, M.4
Lauter, K.5
Sakuma, J.6
Xiong, H.7
Jiang, X.8
-
28
-
-
84977470109
-
FORESEE: Fully Outsourced secuRe gEnome Study basEd on homomorphic Encryption
-
(accepted)
-
Zhang Y, Dai W, Jiang X, Xiong H, Wang S: FORESEE: Fully Outsourced secuRe gEnome Study basEd on homomorphic Encryption. BMC Med Inform Decis Mak. 2015, (accepted)
-
(2015)
BMC Med Inform Decis Mak
-
-
Zhang, Y.1
Dai, W.2
Jiang, X.3
Xiong, H.4
Wang, S.5
-
29
-
-
84861705448
-
Multiparty Computation from Somewhat Homomorphic Encryption
-
Damgard I, Pastro V, Smart NP, Zakarias S: Multiparty Computation from Somewhat Homomorphic Encryption. Cryptology ePrint Archive, Report 2011/535. 2011, [ http://eprint.iacr.org/ ]
-
(2011)
Cryptology EPrint Archive, Report 2011/535
-
-
Damgard, I.1
Pastro, V.2
Smart, N.P.3
Zakarias, S.4
-
30
-
-
0034782679
-
Selective private function evaluation with applications to private statistics
-
Canetti R, Ishai Y, Kumar R, Reiter MK, Rubinfeld R, Wright RN: Selective private function evaluation with applications to private statistics. Proceedings of the Twentieth Annual ACM Symposium on Principles of Distributed Computing ACM. 2001, 293-304.
-
(2001)
Proceedings of the Twentieth Annual ACM Symposium on Principles of Distributed Computing ACM
, pp. 293-304
-
-
Canetti, R.1
Ishai, Y.2
Kumar, R.3
Reiter, M.K.4
Rubinfeld, R.5
Wright, R.N.6
-
32
-
-
84939216125
-
Privacy-preserving multi-keyword search in information networks
-
doi:10.1109/TKDE.2015.2407330
-
Tang Y, Liu L: Privacy-preserving multi-keyword search in information networks. IEEE Trans. Knowl. Data Eng. 2015, 27 (9): 2424-2437. doi:10.1109/TKDE.2015.2407330
-
(2015)
IEEE Trans. Knowl. Data Eng
, vol.27
, Issue.9
, pp. 2424-2437
-
-
Tang, Y.1
Liu, L.2
-
33
-
-
84907798275
-
E-ppi: Locator service in information networks with personalized privacy preservation
-
doi:10.1109/ICDCS.2014.27
-
Tang Y, Liu L, Iyengar A, Lee K, Zhang Q: e-ppi: Locator service in information networks with personalized privacy preservation. IEEE 34th International Conference on Distributed Computing Systems, ICDCS. 2014, 186-197. doi:10.1109/ICDCS.2014.27
-
(2014)
IEEE 34th International Conference on Distributed Computing Systems, ICDCS
, pp. 186-197
-
-
Tang, Y.1
Liu, L.2
Iyengar, A.3
Lee, K.4
Zhang, Q.5
-
34
-
-
83055187000
-
Privacy preserving indexing for ehealth information networks
-
Tang Y, Wang T, Liu L: Privacy preserving indexing for ehealth information networks. CIKM. 2011, 905-914.
-
(2011)
CIKM
, pp. 905-914
-
-
Tang, Y.1
Wang, T.2
Liu, L.3
-
35
-
-
84977264544
-
Secure Multi-pArty Computation Grid LOgistic REgression (SMAC-GLORE)
-
(accepted)
-
Shi H, Wang S, Dai W, Tang Y, Jiang X, Ohno-Machado L: Secure Multi-pArty Computation Grid LOgistic REgression (SMAC-GLORE). Translational Bioinformatics Conference. 2015, (accepted)
-
(2015)
Translational Bioinformatics Conference
-
-
Shi, H.1
Wang, S.2
Dai, W.3
Tang, Y.4
Jiang, X.5
Ohno-Machado, L.6
-
36
-
-
84958541940
-
Privacy-preserving Statistical Data Analysis on Federated Databases
-
Bogdanov D, Kamm L, Laur S, Pruulmann-Vengerfeldt P, Talviste R, Willemson J: Privacy-preserving Statistical Data Analysis on Federated Databases. Springer. 2014
-
(2014)
Springer
-
-
Bogdanov, D.1
Kamm, L.2
Laur, S.3
Pruulmann-Vengerfeldt, P.4
Talviste, R.5
Willemson, J.6
-
37
-
-
84875595667
-
A new way to protect privacy in large-scale genome-wide association studies
-
23413435 1:CAS:528:DC%2BC3sXksFWms70%3D 3605601
-
Kamm L, Bogdanov D, Laur S, Vilo J: A new way to protect privacy in large-scale genome-wide association studies. Bioinformatics. 2013, 29 (7): 886-893.
-
(2013)
Bioinformatics
, vol.29
, Issue.7
, pp. 886-893
-
-
Kamm, L.1
Bogdanov, D.2
Laur, S.3
Vilo, J.4
-
38
-
-
84930733962
-
Securema: Protecting participant privacy in genetic association meta-analysis
-
Xie W, Kantarcioglu M, Bush WS, Crawford D, Denny JC, Heatherly R, Malin BA: Securema: protecting participant privacy in genetic association meta-analysis. Bioinformatics. 2014, 561-
-
(2014)
Bioinformatics
, pp. 561
-
-
Xie, W.1
Kantarcioglu, M.2
Bush, W.S.3
Crawford, D.4
Denny, J.C.5
Heatherly, R.6
Malin, B.A.7
-
39
-
-
84977273106
-
Valid Statistical Analysis for Logistic Regression with Multiple Sources
-
Fienberg SE, Nardi Y, Slavković AB: Valid Statistical Analysis for Logistic Regression with Multiple Sources. Springer. 2009
-
(2009)
Springer
-
-
Fienberg, S.E.1
Nardi, Y.2
Slavković, A.B.3
-
44
-
-
84901005679
-
Routes for breaching and protecting genetic privacy
-
24805122 1:CAS:528:DC%2BC2cXns1Wrurk%3D 4151119
-
Erlich Y, Narayanan A: Routes for breaching and protecting genetic privacy. Nature Reviews Genetics. 2014, 15 (6): 409-421.
-
(2014)
Nature Reviews Genetics
, vol.15
, Issue.6
, pp. 409-421
-
-
Erlich, Y.1
Narayanan, A.2
-
45
-
-
84872459720
-
Identifying personal genomes by surname inference
-
23329047 1:CAS:528:DC%2BC3sXntlSqsw%3D%3D
-
Gymrek M, McGuire AL, Golan D, Halperin E, Erlich Y: Identifying personal genomes by surname inference. Science. 2013, 339 (6117): 321-324.
-
(2013)
Science
, vol.339
, Issue.6117
, pp. 321-324
-
-
Gymrek, M.1
McGuire, A.L.2
Golan, D.3
Halperin, E.4
Erlich, Y.5
-
46
-
-
50849101381
-
Resolving individuals contributing trace amounts of DNA to highly complex mixtures using high-density snp genotyping microarrays
-
Homer N, Szelinger S, Redman M, Duggan D, Tembe W, Muehling J, Pearson JV, Stephan DA, Nelson SF, Craig DW: Resolving individuals contributing trace amounts of dna to highly complex mixtures using high-density snp genotyping microarrays. PLoS genetics. 2008, 4 (8): 1000167-
-
(2008)
PLoS Genetics
, vol.4
, Issue.8
, pp. 1000167
-
-
Homer, N.1
Szelinger, S.2
Redman, M.3
Duggan, D.4
Tembe, W.5
Muehling, J.6
Pearson, J.V.7
Stephan, D.A.8
Nelson, S.F.9
Craig, D.W.10
-
47
-
-
74049130896
-
Learning your identity and disease from research papers: Information leaks in genome wide association study
-
Wang R, Li YF, Wang X, Tang H, Zhou X: Learning your identity and disease from research papers: information leaks in genome wide association study. Proceedings of the 16th ACM Conference on Computer and Communications Security, ACM. 2009, 534-544.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security, ACM
, pp. 534-544
-
-
Wang, R.1
Li, Y.F.2
Wang, X.3
Tang, H.4
Zhou, X.5
-
48
-
-
84977268979
-
-
Parabon Snapshot visited on March 2, 2015
-
Parabon Snapshot: DNA Phenotyping, Ancestry and Kinship Analysis. Available at http://snapshot.parabon-nanolabs.com, visited on March 2, 2015
-
DNA Phenotyping, Ancestry and Kinship Analysis
-
-
-
49
-
-
84862909349
-
Five years of GWAS discovery
-
22243964 1:CAS:528:DC%2BC38XovFGgtQ%3D%3D
-
Visscher PM, Brown MA, McCarthy MI, Yang J: Five years of GWAS discovery. The American Journal of Human Genetics. 2012, 90 (1): 7-24.
-
(2012)
The American Journal of Human Genetics
, vol.90
, Issue.1
, pp. 7-24
-
-
Visscher, P.M.1
Brown, M.A.2
McCarthy, M.I.3
Yang, J.4
-
51
-
-
84977271801
-
-
iDASH Privacy AND Security Workshop visited on March 3, 2015
-
iDASH Privacy AND Security Workshop. 2015, visited on March 3, 2015, [ http://www.humangenomeprivacy.org ]
-
(2015)
-
-
|