TY - JOUR AU - Howe, D. AU - Costanzo, M. AU - Fey, P. AU - Gojobori, T. AU - Hannick, L. AU - Hide, W. AU - Hill, D. P. AU - Kania, R. AU - Schaeffer, M. AU - St Pierre, S. AU - Twigger, S. AU - White, O. AU - Rhee, S. Y. PY - 2008 DA - 2008// TI - Big data: The future of biocuration JO - Nature VL - 455 UR - https://doi.org/10.1038/455047a DO - 10.1038/455047a ID - Howe2008 ER - TY - STD TI - The NIST Definition of Cloud Computing. National Institute of Standards and Technology ID - ref2 ER - TY - STD TI - NOTLODL15L086: Notice for Use of Cloud Computing Services for Storage and Analysis of ControlledLAccess Data Subject to the NIH Genomic Data Sharing (GDS) Policy. [http://grants.nih.gov/grants/guide/noticeRfiles/NOTRODR15-086.html] UR - http://grants.nih.gov/grants/guide/noticeRfiles/NOTRODR15-086.html ID - ref3 ER - TY - JOUR AU - Homer, N. AU - Szelinger, S. AU - Redman, M. AU - Duggan, D. AU - Tembe, W. AU - Muehling, J. AU - Pearson, J. V. AU - Stephan, D. A. AU - Nelson, S. F. AU - Craig, D. W. PY - 2008 DA - 2008// TI - Resolving individuals contributing trace amounts of DNA to highly complex mixtures using highLdensity SNP genotyping microarrays JO - PLoS Genet VL - 4 UR - https://doi.org/10.1371/journal.pgen.1000167 DO - 10.1371/journal.pgen.1000167 ID - Homer2008 ER - TY - JOUR AU - Gymrek, M. AU - McGuire, A. L. AU - Golan, D. AU - Halperin, E. AU - Erlich, Y. PY - 2013 DA - 2013// TI - Identifying personal genomes by surname inference JO - Science (80-) VL - 339 UR - https://doi.org/10.1126/science.1229566 DO - 10.1126/science.1229566 ID - Gymrek2013 ER - TY - CHAP AU - Wang, R. AU - Li, Y. F. AU - Wang, X. AU - Tang, H. AU - Zhou, X. PY - 2009 DA - 2009// TI - Learning your identity and disease from research papers BT - Proceedings of the 16th ACM conference on Computer and communications security - CCS '09 PB - ACM Press CY - New York, New York, USA UR - https://doi.org/10.1145/1653662.1653726 DO - 10.1145/1653662.1653726 ID - Wang2009 ER - TY - BOOK AU - Naveed, M. AU - Ayday, E. AU - Clayton, E. W. AU - Fellay, J. AU - Gunter, C. A. AU - Hubaux, J. R. P. AU - Malin, B. A. AU - Wang, X. PY - 2014 DA - 2014// TI - Privacy and Security in the Genomic Era ID - Naveed2014 ER - TY - JOUR AU - Wang, S. AU - Mohammed, N. AU - Chen, R. PY - 2014 DA - 2014// TI - Differentially private genome data dissemination through topLdown specialization JO - BMC Med Inform Decis Mak VL - 14 UR - https://doi.org/10.1186/1472-6947-14-S1-S2 DO - 10.1186/1472-6947-14-S1-S2 ID - Wang2014 ER - TY - JOUR AU - Kamm, L. AU - Bogdanov, D. AU - Laur, S. AU - Vilo, J. PY - 2013 DA - 2013// TI - A new way to protect privacy in largeLscale genomeLwide association studies JO - Bioinformatics VL - 29 UR - https://doi.org/10.1093/bioinformatics/btt066 DO - 10.1093/bioinformatics/btt066 ID - Kamm2013 ER - TY - CHAP AU - Zhou, M. AU - Zhang, R. AU - Xie, W. AU - Qian, W. AU - Zhou, A. PY - 2010 DA - 2010// TI - Security and Privacy in Cloud Computing: A Survey BT - 2010 Sixth International Conference on Semantics, Knowledge and Grids. IEEE UR - https://doi.org/10.1109/SKG.2010.19 DO - 10.1109/SKG.2010.19 ID - Zhou2010 ER - TY - CHAP AU - Wang, W. AU - Hu, Y. AU - Chen, L. PY - 2012 DA - 2012// TI - Accelerating fully homomorphic encryption using GPU BT - IEEE Conference on High Performance Extreme Computing (HPEC) ID - Wang2012 ER - TY - CHAP AU - Gentry, C. PY - 2009 DA - 2009// TI - Fully homomorphic encryption using ideal lattices BT - Proceedings of the 41st annual ACM symposium on Symposium on theory of computing - STOC '09 PB - ACM Press CY - New York, NY, USA UR - https://doi.org/10.1145/1536414.1536440 DO - 10.1145/1536414.1536440 ID - Gentry2009 ER - TY - CHAP AU - Brakerski, Z. AU - Gentry, C. AU - Vaikuntanathan, V. PY - 2012 DA - 2012// TI - (Leveled) fully homomorphic encryption without bootstrapping BT - Proceedings of the 3rd Innovations in Theoretical Computer Science Conference on - ITCS '12 PB - ACM Press CY - New York, NY, USA UR - https://doi.org/10.1145/2090236.2090262 DO - 10.1145/2090236.2090262 ID - Brakerski2012 ER - TY - JOUR AU - Brakerski, Z. AU - Vaikuntanathan, V. PY - 2011 DA - 2011// TI - Efficient fully homomorphic encryption from (standard) LWE JO - SIAM J Comput VL - 43 UR - https://doi.org/10.1137/120868669 DO - 10.1137/120868669 ID - Brakerski2011 ER - TY - CHAP AU - Lauter, K. AU - LópezRAlt, A. AU - Naehrig, M. PY - 2014 DA - 2014// TI - Private computation on encrypted genomic data BT - 14th Privacy Enhancing Technologies Symposium, Workshop on Genome Privacy (GenoPri'14) PB - Amsterdam CY - The Netherlands ID - Lauter2014 ER - TY - CHAP AU - Togan, M. AU - Plesca, C. PY - 2014 DA - 2014// TI - ComparisonLbased computations over fully homomorphic encrypted data BT - Communications (COMM), 2014 10th International Conference on ID - Togan2014 ER - TY - CHAP AU - Graepel, T. AU - Lauter, K. AU - Naehrig, M. PY - 2013 DA - 2013// TI - ML confidential: Machine learning on encrypted data BT - Information Security and Cryptology ICISC 2012 UR - https://doi.org/10.1007/978-3-642-37682-5_1 DO - 10.1007/978-3-642-37682-5_1 ID - Graepel2013 ER - TY - CHAP AU - Naehrig, M. AU - Lauter, K. AU - Vaikuntanathan, V. PY - 2011 DA - 2011// TI - Can homomorphic encryption be practical? BT - Proceedings of the 3rd ACM workshop on Cloud computing security workshop - CCSW '11 PB - ACM Press CY - New York, NY, USA UR - https://doi.org/10.1145/2046660.2046682 DO - 10.1145/2046660.2046682 ID - Naehrig2011 ER - TY - CHAP AU - Cheon, J. H. AU - Kim, M. AU - Lauter, K. PY - 2015 DA - 2015// TI - Homomorphic Computation of Edit Distance BT - WAHC'15 - 3rd Workshop on Encrypted Computing and Applied Homomorphic Cryptography ID - Cheon2015 ER - TY - CHAP AU - Hazay, C. AU - Lindell, Y. PY - 2010 DA - 2010// BT - Efficient Secure Two-Party Protocols PB - Springer Berlin Heidelberg CY - Berlin, Heidelberg UR - https://doi.org/10.1007/978-3-642-14303-8 DO - 10.1007/978-3-642-14303-8 ID - Hazay2010 ER - TY - STD TI - 2015 iDASH Privacy and security Workshop. [http://www.humangenomeprivacy.org/2015/] UR - http://www.humangenomeprivacy.org/2015/ ID - ref21 ER - TY - JOUR AU - Bos, J. W. AU - Lauter, K. AU - Naehrig, M. PY - 2014 DA - 2014// TI - Private predictive analysis on encrypted medical data JO - J Biomed Inform VL - 50 UR - https://doi.org/10.1016/j.jbi.2014.04.003 DO - 10.1016/j.jbi.2014.04.003 ID - Bos2014 ER - TY - STD TI - [https://github.com/shaih/HElib] UR - https://github.com/shaih/HElib ID - ref23 ER - TY - CHAP AU - Wang, S. AU - Zhang, Y. AU - Dai, W. AU - Lauter, K. AU - Kim, M. AU - Tang, Y. AU - Xiong, H. AU - Jiang, X. PY - 2015 DA - 2015// TI - HEALER: Homomorphic computation of ExAct Logistic rEgRession for secure rare disease variants analysis in GWAS BT - Bioinformatics ID - Wang2015 ER - TY - CHAP AU - Zhang, Y. AU - Dai, W. AU - Wang, S. AU - Kim, M. AU - Lauter, K. AU - Sakuma, J. AU - Xiong, H. AU - Jiang, X. PY - 2015 DA - 2015// TI - SECRET: Secure EditLdistance computation over homomoRphic Encrypted daTa BT - Proceedings of the 5th Annual Translational Bioinformatics Conference Tokyo, Japan ID - Zhang2015 ER -