Privacy-Preserving Disease Risk Test Based on Bloom Filters
暂无分享,去创建一个
Siu-Ming Yiu | Jun Zhang | Meiqi He | Linru Zhang | S. Yiu | Jun Zhang | Meiqi He | Linru Zhang
[1] Bo Peng,et al. Large-Scale Privacy-Preserving Mapping of Human Genomic Sequences on Hybrid Clouds , 2012, NDSS.
[2] Jean-Pierre Hubaux,et al. Addressing the concerns of the lacks family: quantification of kin genomic privacy , 2013, CCS.
[3] Ahmad-Reza Sadeghi,et al. Efficient Privacy-Preserving Face Recognition , 2009, ICISC.
[4] Yaniv Erlich,et al. Routes for breaching and protecting genetic privacy , 2013, Nature Reviews Genetics.
[5] Jean-Pierre Hubaux,et al. Privacy-Preserving Computation of Disease Risk by Using Genomic, Clinical, and Environmental Data , 2013, HealthTech.
[6] Yihua Zhang,et al. Secure distributed genome analysis for GWAS and sequence comparison computation , 2015, BMC Medical Informatics and Decision Making.
[7] J. Pennekamp,et al. BLOOM: BLoom filter based oblivious outsourced matchings , 2017, BMC Medical Genomics.
[8] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[9] Stefan Katzenbeisser,et al. Privacy-Preserving Whole Genome Sequence Processing through Proxy-Aided ORAM , 2014, WPES.
[10] Stefan Katzenbeisser,et al. Privacy-Preserving Face Recognition , 2009, Privacy Enhancing Technologies.
[11] Jacques Fellay,et al. Contribution of genetic background, traditional risk factors, and HIV-related factors to coronary artery disease events in HIV-positive persons. , 2013, Clinical infectious diseases : an official publication of the Infectious Diseases Society of America.
[12] Jean-Pierre Hubaux,et al. Protecting and evaluating genomic privacy in medical tests and personalized medicine , 2013, WPES.
[13] Sudha Seshadri,et al. Genome-wide analysis of genetic loci associated with Alzheimer disease. , 2010, JAMA.
[14] Matthew Smith,et al. Privacy/performance trade-off in private search on bio-medical data , 2014, Future Gener. Comput. Syst..
[15] D. Falconer,et al. Introduction to Quantitative Genetics. , 1962 .
[16] Emiliano De Cristofaro,et al. Fast and Private Genomic Testing for Disease Susceptibility , 2014, WPES.
[17] Andrei Broder,et al. Network Applications of Bloom Filters: A Survey , 2004, Internet Math..
[18] Bo Peng,et al. To Release or Not to Release: Evaluating Information Leaks in Aggregate Human-Genome Data , 2011, ESORICS.
[19] Jean-Pierre Hubaux,et al. Personal use of the genomic data: Privacy vs. storage cost , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).
[20] Emmanuel Bresson,et al. A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and Its Applications , 2003, ASIACRYPT.
[21] R. Frankham. Introduction to quantitative genetics (4th edn): by Douglas S. Falconer and Trudy F.C. Mackay Longman, 1996. £24.99 pbk (xv and 464 pages) ISBN 0582 24302 5 , 1996 .
[22] S. Nelson,et al. Resolving Individuals Contributing Trace Amounts of DNA to Highly Complex Mixtures Using High-Density SNP Genotyping Microarrays , 2008, PLoS genetics.
[23] Jean-Pierre Hubaux,et al. Privacy Threats and Practical Solutions for Genetic Risk Tests , 2015, 2015 IEEE Security and Privacy Workshops.
[24] C. Bustamante,et al. Privacy Risks from Genomic Data-Sharing Beacons , 2015, American journal of human genetics.
[25] Wei Zhuang,et al. Research on Privacy-Preserving Cloud Storage Framework Supporting Ciphertext Retrieval , 2011, 2011 International Conference on Network Computing and Information Security.
[26] M. Daly,et al. Genetic Mapping in Human Disease , 2008, Science.
[27] Emiliano De Cristofaro,et al. Genodroid: are privacy-preserving genomic tests ready for prime time? , 2012, WPES '12.
[28] Bradley Malin,et al. Technical Evaluation: An Evaluation of the Current State of Genomic Data Privacy Protection Technology and a Roadmap for the Future , 2004, J. Am. Medical Informatics Assoc..