-
1
-
-
51349115095
-
Big data: The future of biocuration
-
18769432 1:CAS:528:DC%2BD1cXhtVKrsbnM 2819144
-
Howe D, Costanzo M, Fey P, Gojobori T, Hannick L, Hide W, Hill DP, Kania R, Schaeffer M, St Pierre S, Twigger S, White O, Rhee SY: Big data: The future of biocuration. Nature. 2008, 455: 47-50.
-
(2008)
Nature
, vol.455
, pp. 47-50
-
-
Howe, D.1
Costanzo, M.2
Fey, P.3
Gojobori, T.4
Hannick, L.5
Hide, W.6
Hill, D.P.7
Kania, R.8
Schaeffer, M.9
St Pierre, S.10
Twigger, S.11
White, O.12
Rhee, S.Y.13
-
4
-
-
50849101381
-
Resolving individuals contributing trace amounts of DNA to highly complex mixtures using highLdensity SNP genotyping microarrays
-
18769715 2516199
-
Homer N, Szelinger S, Redman M, Duggan D, Tembe W, Muehling J, Pearson JV, Stephan DA, Nelson SF, Craig DW: Resolving individuals contributing trace amounts of DNA to highly complex mixtures using highLdensity SNP genotyping microarrays. PLoS Genet. 2008, 4: e1000167-
-
(2008)
PLoS Genet
, vol.4
, pp. e1000167
-
-
Homer, N.1
Szelinger, S.2
Redman, M.3
Duggan, D.4
Tembe, W.5
Muehling, J.6
Pearson, J.V.7
Stephan, D.A.8
Nelson, S.F.9
Craig, D.W.10
-
5
-
-
84872459720
-
Identifying personal genomes by surname inference
-
1:CAS:528:DC%2BC3sXntlSqsw%3D%3D
-
Gymrek M, McGuire AL, Golan D, Halperin E, Erlich Y: Identifying personal genomes by surname inference. Science (80-). 2013, 339: 321-324.
-
(2013)
Science (80-)
, vol.339
, pp. 321-324
-
-
Gymrek, M.1
McGuire, A.L.2
Golan, D.3
Halperin, E.4
Erlich, Y.5
-
6
-
-
74049130896
-
Learning your identity and disease from research papers
-
ACM Press New York, New York, USA
-
Wang R, Li YF, Wang X, Tang H, Zhou X: Learning your identity and disease from research papers. Proceedings of the 16th ACM conference on Computer and communications security - CCS '09. 2009, New York, New York, USA: ACM Press, 534-44.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security - CCS '09
, pp. 534-544
-
-
Wang, R.1
Li, Y.F.2
Wang, X.3
Tang, H.4
Zhou, X.5
-
7
-
-
84938669382
-
-
Naveed M, Ayday E, Clayton EW, Fellay J, Gunter CA, Hubaux JRP, Malin BA, Wang X: Privacy and Security in the Genomic Era. 2014
-
(2014)
Privacy and Security in the Genomic Era
-
-
Naveed, M.1
Ayday, E.2
Clayton, E.W.3
Fellay, J.4
Gunter, C.A.5
Hubaux, J.R.P.6
Malin, B.A.7
Wang, X.8
-
8
-
-
84964314800
-
Differentially private genome data dissemination through topLdown specialization
-
25521306 4290801
-
Wang S, Mohammed N, Chen R: Differentially private genome data dissemination through topLdown specialization. BMC Med Inform Decis Mak. 2014, 14 (Suppl 1): S2-
-
(2014)
BMC Med Inform Decis Mak
, vol.14
, pp. S2
-
-
Wang, S.1
Mohammed, N.2
Chen, R.3
-
9
-
-
84875595667
-
A new way to protect privacy in largeLscale genomeLwide association studies
-
23413435 1:CAS:528:DC%2BC3sXksFWms70%3D 3605601
-
Kamm L, Bogdanov D, Laur S, Vilo J: A new way to protect privacy in largeLscale genomeLwide association studies. Bioinformatics. 2013, 29: 886-93.
-
(2013)
Bioinformatics
, vol.29
, pp. 886-893
-
-
Kamm, L.1
Bogdanov, D.2
Laur, S.3
Vilo, J.4
-
10
-
-
84880192224
-
Security and Privacy in Cloud Computing: A Survey
-
Zhou M, Zhang R, Xie W, Qian W, Zhou A: Security and Privacy in Cloud Computing: A Survey. 2010 Sixth International Conference on Semantics, Knowledge and Grids. IEEE. 2010, 105-112.
-
(2010)
2010 Sixth International Conference on Semantics, Knowledge and Grids. IEEE
, pp. 105-112
-
-
Zhou, M.1
Zhang, R.2
Xie, W.3
Qian, W.4
Zhou, A.5
-
13
-
-
84856466374
-
(Leveled) fully homomorphic encryption without bootstrapping
-
ACM Press New York, NY, USA
-
Brakerski Z, Gentry C, Vaikuntanathan V: (Leveled) fully homomorphic encryption without bootstrapping. Proceedings of the 3rd Innovations in Theoretical Computer Science Conference on - ITCS '12. 2012, New York, NY, USA: ACM Press, 111: 309-325.
-
(2012)
Proceedings of the 3rd Innovations in Theoretical Computer Science Conference on - ITCS '12
, vol.111
, pp. 309-325
-
-
Brakerski, Z.1
Gentry, C.2
Vaikuntanathan, V.3
-
14
-
-
84899651713
-
Efficient fully homomorphic encryption from (standard) LWE
-
Brakerski Z, Vaikuntanathan V: Efficient fully homomorphic encryption from (standard) LWE. SIAM J Comput. 2011, 43: 831-871.
-
(2011)
SIAM J Comput
, vol.43
, pp. 831-871
-
-
Brakerski, Z.1
Vaikuntanathan, V.2
-
18
-
-
80955157888
-
Can homomorphic encryption be practical?
-
ACM Press New York, NY, USA
-
Naehrig M, Lauter K, Vaikuntanathan V: Can homomorphic encryption be practical?. Proceedings of the 3rd ACM workshop on Cloud computing security workshop - CCSW '11. 2011, New York, NY, USA: ACM Press, 113-
-
(2011)
Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop - CCSW '11
, pp. 113
-
-
Naehrig, M.1
Lauter, K.2
Vaikuntanathan, V.3
-
20
-
-
79958010869
-
-
Springer Berlin Heidelberg Berlin, Heidelberg Information Security and Cryptography
-
Hazay C, Lindell Y: Efficient Secure Two-Party Protocols. 2010, Berlin, Heidelberg: Springer Berlin Heidelberg, Information Security and Cryptography
-
(2010)
Efficient Secure Two-Party Protocols
-
-
Hazay, C.1
Lindell, Y.2
-
22
-
-
84905174579
-
Private predictive analysis on encrypted medical data
-
24835616
-
Bos JW, Lauter K, Naehrig M: Private predictive analysis on encrypted medical data. J Biomed Inform. 2014, 50: 234-243.
-
(2014)
J Biomed Inform
, vol.50
, pp. 234-243
-
-
Bos, J.W.1
Lauter, K.2
Naehrig, M.3
-
23
-
-
84977510918
-
-
[ https://github.com/shaih/HElib ]
-
-
-
-
24
-
-
84959864390
-
HEALER: Homomorphic computation of ExAct Logistic rEgRession for secure rare disease variants analysis in GWAS
-
[accepted]
-
Wang S, Zhang Y, Dai W, Lauter K, Kim M, Tang Y, Xiong H, Jiang X: HEALER: Homomorphic computation of ExAct Logistic rEgRession for secure rare disease variants analysis in GWAS. Bioinformatics. 2015, [accepted]
-
(2015)
Bioinformatics
-
-
Wang, S.1
Zhang, Y.2
Dai, W.3
Lauter, K.4
Kim, M.5
Tang, Y.6
Xiong, H.7
Jiang, X.8
-
25
-
-
84982742460
-
SECRET: Secure EditLdistance computation over homomoRphic Encrypted daTa
-
[accepted]
-
Zhang Y, Dai W, Wang S, Kim M, Lauter K, Sakuma J, Xiong H, Jiang X: SECRET: Secure EditLdistance computation over homomoRphic Encrypted daTa. Proceedings of the 5th Annual Translational Bioinformatics Conference Tokyo, Japan. 2015, [accepted]
-
(2015)
Proceedings of the 5th Annual Translational Bioinformatics Conference Tokyo, Japan
-
-
Zhang, Y.1
Dai, W.2
Wang, S.3
Kim, M.4
Lauter, K.5
Sakuma, J.6
Xiong, H.7
Jiang, X.8
|