Securing Aggregate Queries for DNA Databases
暂无分享,去创建一个
Mikhail J. Atallah | Mohamed Nassar | Qutaibah M. Malluhi | Abdullatif Shikfa | M. Atallah | Abdullatif Shikfa | M. Nassar | Q. Malluhi
[1] Yihua Zhang,et al. An Overview of Issues and Recent Developments in Cloud Computing and Storage Security , 2014 .
[2] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[3] David Chaum,et al. Blind Signatures for Untraceable Payments , 1982, CRYPTO.
[4] Claude Liébecq. Biochemical nomenclature and related documents : a compendium , 1992 .
[5] Ernest F. Brickell,et al. Fast Exponentiation with Precomputation (Extended Abstract) , 1992, EUROCRYPT.
[6] Taher ElGamal,et al. A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .
[7] Paul Helman,et al. Protecting data privacy through hard-to-reverse negative databases , 2007, International Journal of Information Security.
[8] Marina Blanton,et al. Secure Outsourcing of DNA Searching via Finite Automata , 2010, DBSec.
[9] Josh Benaloh,et al. Dense Probabilistic Encryption , 1999 .
[10] Matthew K. Franklin,et al. Communication-Efficient Private Protocols for Longest Common Subsequence , 2009, CT-RSA.
[11] Bradley Malin,et al. How (not) to protect genomic data privacy in a distributed network: using trail re-identification to evaluate and design anonymity protection systems , 2004, J. Biomed. Informatics.
[12] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[13] Markus Jakobsson,et al. Cryptographic Approaches to Provacy in Forensic DNA Databases , 2000, Public Key Cryptography.
[14] Doug Szajda,et al. Toward a Practical Data Privacy Scheme for a Distributed Implementation of the Smith-Waterman Genome Sequence Comparison Algorithm , 2006, NDSS.
[15] Keith B. Frikken. Practical Private DNA String Searching and Matching through Efficient Oblivious Automata Evaluation , 2009, DBSec.
[16] Mikhail J. Atallah,et al. Secure outsourcing of sequence comparisons , 2004, International Journal of Information Security.
[17] Stefan Katzenbeisser,et al. Privacy preserving error resilient dna searching through oblivious automata , 2007, CCS '07.
[18] Payman Mohassel,et al. Longest common subsequence as private search , 2009, WPES '09.
[19] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[20] P. Bohley,et al. Biochemical Nomenclature and Related Documents: International Union of Biochemistry Pergamon; New York, Oxford, 1978 vi + 224 pages , 1980 .
[21] Murat Kantarcioglu,et al. A Cryptographic Approach to Securely Share and Query Genomic Sequences , 2008, IEEE Transactions on Information Technology in Biomedicine.
[22] Stefan Katzenbeisser,et al. Privacy-Preserving Matching of DNA Profiles , 2008, IACR Cryptol. ePrint Arch..
[23] Chris Clifton,et al. Updating outsourced anatomized private databases , 2013, EDBT '13.
[24] Zhen Lin,et al. Genomic Research and Human Subject Privacy , 2004, Science.
[25] Latanya Sweeney,et al. Identifying Participants in the Personal Genome Project by Name , 2013, ArXiv.
[26] Mikhail J. Atallah,et al. Secure and Efficient Outsourcing of Sequence Comparisons , 2012, ESORICS.