暂无分享,去创建一个
Peter M. A. Sloot | Ronald Cramer | Thijs Veugen | Serge Fehr | Emiliano Mancini | Jan de Gier | Andrea De Luca | Daniël Worm | Mark Abspoel | Gabriele Spini | Maran van Heesch | Thomas Attema | R. Cramer | T. Veugen | P. Sloot | S. Fehr | D. Worm | A. De Luca | Mark Abspoel | E. Mancini | G. Spini | T. Attema | Jan de Gier | Maran Van Heesch | Andrea De Luca
[1] Kristin E. Lauter,et al. Private genome analysis through homomorphic encryption , 2015, BMC Medical Informatics and Decision Making.
[2] P Ping Chen,et al. Secure multiparty computation for privacy preserving data mining , 2012 .
[3] Ronald Cramer,et al. A Framework for Secure Computations With Two Non-Colluding Servers and Multiple Clients, Applied to Recommendations , 2015, IEEE Transactions on Information Forensics and Security.
[4] Hans Skovgaard Poulsen,et al. Clinical variables serve as prognostic factors in a model for survival from glioblastoma multiforme: an observational study of a cohort of consecutive non-selected patients from a single institution , 2013, BMC Cancer.
[5] Peter M. A. Sloot,et al. A Grid-Based Hiv Expert System , 2005, CCGrid 2005. IEEE International Symposium on Cluster Computing and the Grid, 2005..
[6] Yehuda Lindell,et al. Privacy-Preserving Search of Similar Patients in Genomic Data , 2018, IACR Cryptol. ePrint Arch..
[7] Ritu Sadana,et al. The World report on ageing and health: a policy framework for healthy ageing , 2016, The Lancet.
[8] M A Peter. Title HIV decision support : from molecule to man , 2009 .
[9] Jun Hu,et al. A secure protocol for protecting the identity of providers when disclosing data for disease surveillance , 2011, J. Am. Medical Informatics Assoc..
[10] Jihoon Kim,et al. iDASH: integrating data for analysis, anonymization, and sharing , 2012, J. Am. Medical Informatics Assoc..
[11] E. Balas,et al. Improving clinical practice using clinical decision support systems: a systematic review of trials to identify features critical to success , 2005, BMJ : British Medical Journal.
[12] Koji Chida,et al. Implementation and evaluation of an efficient secure computation system using 'R' for healthcare statistics. , 2014, Journal of the American Medical Informatics Association : JAMIA.
[13] Julia Adler-Milstein,et al. Making IT work - harnessing the power of health information technology ti improve care in England , 2016 .
[14] Yehuda Lindell,et al. Introduction to Modern Cryptography, Second Edition , 2014 .
[15] Ivan Damgård,et al. Secure Multiparty Computation Goes Live , 2009, Financial Cryptography.
[16] Adam Wright,et al. White paper: A Roadmap for National Action on Clinical Decision Support , 2007, J. Am. Medical Informatics Assoc..
[18] W. A. Beyer,et al. Some Biological Sequence Metrics , 1976 .
[19] Marcel Keller,et al. Practical Covertly Secure MPC for Dishonest Majority - Or: Breaking the SPDZ Limits , 2013, ESORICS.
[20] S. Asch,et al. Development of national and multiagency HIV care quality measures. , 2010, Clinical infectious diseases : an official publication of the Infectious Diseases Society of America.
[21] Silvio Micali,et al. A Completeness Theorem for Protocols with Honest Majority , 1987, STOC 1987.
[22] Marian Bubak,et al. Expanding the Knowledge Economy : Issues , Applications , Case Studies , 2007 .
[23] Marian Bubak,et al. ViroLab: A collaborative decision support system in viral disease treatment , 2008 .
[24] Ivan Damgård,et al. Confidential Benchmarking Based on Multiparty Computation , 2016, Financial Cryptography.
[25] Frederik Vercauteren,et al. Privacy-Preserving Genome-Wide Association Study is Practical , 2017, IACR Cryptol. ePrint Arch..
[26] Peter M. A. Sloot,et al. Comparison of HIV-1 Genotypic Resistance Test Interpretation Systems in Predicting Virological Outcomes Over Time , 2010, PloS one.
[27] H. Mcdonald,et al. Effects of computerized clinical decision support systems on practitioner performance and patient outcomes: a systematic review. , 2005, JAMA.
[28] David Chaum,et al. Multiparty Unconditionally Secure Protocols (Extended Abstract) , 1988, STOC.
[29] Tommy F. Liu,et al. The HIVdb System for HIV-1 Genotypic Resistance Interpretation , 2012, Intervirology.
[30] Yves A. Lussier,et al. Rethinking the role and impact of health information technology: informatics as an interventional discipline , 2016, BMC Medical Informatics and Decision Making.
[31] V. Hasselblad,et al. Effect of Clinical Decision-Support Systems , 2012, Annals of Internal Medicine.
[32] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[33] Ivan Damgård,et al. Secure Multiparty Computation and Secret Sharing , 2015 .
[34] Andrew Chi-Chih Yao,et al. Protocols for Secure Computations (Extended Abstract) , 1982, FOCS.
[35] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[36] Ivan Damgård,et al. Multiparty Computation from Somewhat Homomorphic Encryption , 2012, IACR Cryptol. ePrint Arch..
[37] Marcel Keller,et al. Overdrive: Making SPDZ Great Again , 2018, IACR Cryptol. ePrint Arch..
[38] Thomas Lengauer,et al. Prediction of response to antiretroviral therapy by human experts and by the EuResist data‐driven expert system (the EVE study) , 2010, HIV medicine.
[39] Avi Wigderson,et al. Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation (Extended Abstract) , 1988, STOC.
[40] Ling Li,et al. Impact of commercial computerized provider order entry (CPOE) and clinical decision support systems (CDSSs) on medication errors, length of stay, and mortality in intensive care units: a systematic review and meta-analysis , 2017, J. Am. Medical Informatics Assoc..
[41] David E Bloom,et al. Towards a comprehensive public health response to population ageing , 2015, The Lancet.
[42] P. Sloot,et al. Combining Epidemiological and Genetic Networks Signifies the Importance of Early Treatment in HIV-1 Transmission , 2012, PloS one.
[43] Yehuda Lindell,et al. Introduction to Modern Cryptography , 2004 .
[44] Stéphane Hué,et al. Genetic analysis reveals the complex structure of HIV-1 transmission within defined risk groups. , 2005, Proceedings of the National Academy of Sciences of the United States of America.
[45] Ahmad-Reza Sadeghi,et al. Secure Evaluation of Private Linear Branching Programs with Medical Applications , 2009, ESORICS.
[46] R. Shafer. Rationale and uses of a public HIV drug-resistance database. , 2006, The Journal of infectious diseases.
[47] B. J. Betts,et al. HIV-1 protease and reverse transcriptase mutation patterns responsible for discordances between genotypic drug resistance interpretation algorithms. , 2003, Journal of acquired immune deficiency syndromes.