X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Conference Proceeding (38) 38
Journal Article (36) 36
Patent (23) 23
Publication (21) 21
Dissertation (2) 2
Book Chapter (1) 1
Book Review (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
physics (23) 23
calculating (22) 22
computing (22) 22
counting (22) 22
electric digital data processing (22) 22
electric communication technique (21) 21
electricity (21) 21
information and communication technology [ict] specially adaptedfor specific application fields (21) 21
transmission of digital information, e.g. telegraphiccommunication (21) 21
privacy (20) 20
genomics (18) 18
data privacy (17) 17
security (15) 15
bioinformatics (14) 14
genomic privacy (14) 14
genes (11) 11
healthcare informatics, i.e. information and communicationtechnology [ict] specially adapted for the handling orprocessing of medical or healthcare data (11) 11
cryptography (9) 9
belief propagation (8) 8
authentication (7) 7
computer science, information systems (7) 7
encryption (7) 7
availability (6) 6
blasting (6) 6
computer science - cryptography and security (6) 6
dna (6) 6
heating (6) 6
lighting (6) 6
mechanical engineering (6) 6
peer to peer computing (6) 6
positive displacement machines for liquids (6) 6
protocols (6) 6
pumps for liquids or elastic fluids (6) 6
rotary-piston, or oscillating-piston, positive-displacementmachines for liquids (6) 6
rotary-piston, or oscillating-piston, positive-displacementpumps (6) 6
weapons (6) 6
computer science, software engineering (5) 5
computer security (5) 5
data security (5) 5
genom (5) 5
genomik (5) 5
humans (5) 5
index medicus (5) 5
inference (5) 5
iterative algorithms (5) 5
probability distribution (5) 5
recommender systems (5) 5
wireless sensor networks (5) 5
ad hoc networks (4) 4
biochemical research methods (4) 4
biotechnology & applied microbiology (4) 4
computer science, hardware & architecture (4) 4
data processing systems or methods, specially adapted foradministrative, commercial, financial, managerial, supervisoryor forecasting purposes (4) 4
diseases (4) 4
dna sequencing (4) 4
filtering (4) 4
genetics (4) 4
genome sequencing (4) 4
genomes (4) 4
iterative decoding (4) 4
iterative methods (4) 4
personalized medicine (4) 4
systems or methods specially adapted for administrative,commercial, financial, managerial, supervisory or forecastingpurposes, not otherwise provided for (4) 4
aggregates (3) 3
algorithm design and analysis (3) 3
bayesian methods (3) 3
besitzer (3) 3
collaboration (3) 3
complexity theory (3) 3
computer science (3) 3
ethics (3) 3
genetic privacy (3) 3
genetic testing (3) 3
genetics & heredity (3) 3
health care (3) 3
inference algorithms (3) 3
kinship (3) 3
message passing (3) 3
mobile computing (3) 3
network security (3) 3
online services (3) 3
prediction algorithms (3) 3
robustness (3) 3
sensitive informations (3) 3
servers (3) 3
trust and reputation management (3) 3
wireless application protocol (3) 3
access control (2) 2
algorithm (2) 2
algorithms (2) 2
biochemistry & molecular biology (2) 2
biomedical research (2) 2
broadcasting (2) 2
business (2) 2
clinical genomics (2) 2
computational complexity (2) 2
computer networks (2) 2
computer privacy (2) 2
computer science, interdisciplinary applications (2) 2
computer science, theory & methods (2) 2
more...
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2016, Volume 9604, pp. 328 - 341
Conference Proceeding
IEEE Security & Privacy, ISSN 1540-7993, 2017, Volume 15, Issue 5, pp. 29 - 37
Genomic data poses serious interdependent risks: your data might also leak information about your family members' data. Methods attackers use to infer genomic... 
Data privacy | DNA dragnets | software | Genome Privacy and Security | Genomics | kinship | cryptographic controls | Biological cells | public policy | Privacy | security | Law enforcement | genetics | DNA | software engineering | genomic data | Bioinformatics | Computer security | privacy | COMPUTER SCIENCE, SOFTWARE ENGINEERING | COMPUTER SCIENCE, INFORMATION SYSTEMS
Journal Article
IEEE/ACM Transactions on Computational Biology and Bioinformatics, ISSN 1545-5963, 07/2019, Volume 16, Issue 4, pp. 1322 - 1323
The four papers in this special section were presented at the 4th International Workshop on Genome Privacy and Security (GenoPri) in 2017. This workshop aimed... 
Data privacy | Patient monitoring | Special issues and sections | Genomics | DNA | Medical information systems | Bioinformatics | Computer security
Journal Article
IEEE Transactions on Dependable and Secure Computing, ISSN 1545-5971, 01/2019, Volume 16, Issue 1, pp. 33 - 43
In this work, we consider a scenario that includes an individual sharing his genomic data (or results obtained from his genomic data) with a service provider.... 
Data privacy | Privacy | security | Aggregates | Genomics | liability | genomic privacy | credibility | Cryptography | Bioinformatics | Liability | Genomic privacy | Credibility | Security | COMPUTER SCIENCE, SOFTWARE ENGINEERING | COMPUTER SCIENCE, HARDWARE & ARCHITECTURE | COMPUTER SCIENCE, INFORMATION SYSTEMS | Consent | Information sharing | Network security | Internet service providers
Journal Article
IEEE Transactions on Dependable and Secure Computing, ISSN 1545-5971, 05/2012, Volume 9, Issue 3, pp. 375 - 386
Journal Article
IEEE Transactions on Dependable and Secure Computing, ISSN 1545-5971, 1/2019, pp. 1 - 1
Thanks to the popularity of mobile devices numerous location-based services (LBS) have emerged. While several privacy-preserving solutions for LBS have been... 
Access control | Privacy | Data privacy | database outsourcing | efficiency | multi-location | Bloom filter | Outsourcing | Encryption | Indexes | LBS | privacy-preserving
Journal Article
IEEE Transactions on Dependable and Secure Computing, ISSN 1545-5971, 03/2019, Volume 16, Issue 2, pp. 329 - 343
Journal Article
Bioinformatics, ISSN 1367-4803, 01/2018, Volume 34, Issue 2, pp. 181 - 189
Abstract Motivation Rapid and low cost sequencing of genomes enabled widespread use of genomic data in research studies and personalized customer applications,... 
GENETIC RELATIVES | WIDE ASSOCIATION | INFERENCE | BIOTECHNOLOGY & APPLIED MICROBIOLOGY | BIOCHEMICAL RESEARCH METHODS | MATHEMATICAL & COMPUTATIONAL BIOLOGY
Journal Article
Genome Research, ISSN 1088-9051, 12/2016, Volume 26, Issue 12, pp. 1687 - 1696
Journal Article
IEEE/ACM Transactions on Computational Biology and Bioinformatics, ISSN 1545-5963, 07/2018, Volume 15, Issue 4, pp. 1333 - 1343
Journal Article
Genome Research, ISSN 1088-9051, 09/2018, Volume 28, Issue 9, pp. 1255 - 1263
Genomics data introduce a substantial computational burden as well as data privacy and ownership issues. Data sets generated by high-throughput sequencing... 
BIOTECHNOLOGY & APPLIED MICROBIOLOGY | BIOCHEMISTRY & MOLECULAR BIOLOGY | GENETICS & HEREDITY | Algorithms | Humans | Genomics - standards | Big Data | Data Anonymization | Genome, Human | Genomics - methods | Genomics - trends | Index Medicus
Journal Article
Bioinformatics, ISSN 1367-4803, 02/2019, Volume 35, Issue 3, pp. 365 - 371
Abstract Motivation Genomic data-sharing beacons aim to provide a secure, easy to implement and standardized interface for data-sharing by only allowing yes/no... 
PRIVACY | BIOTECHNOLOGY & APPLIED MICROBIOLOGY | BIOCHEMICAL RESEARCH METHODS | MATHEMATICAL & COMPUTATIONAL BIOLOGY
Journal Article
IEEE/ACM Transactions on Computational Biology and Bioinformatics, ISSN 1545-5963, 09/2018, Volume 15, Issue 5, pp. 1403 - 1404
The three papers included this special section were presented at the 3rd International Workshop on Genome Privacy and Security (GenoPri) in 2016. GenoPri’16... 
Privacy | Special issues and sections | Security | Meetings | Genomics | STATISTICS & PROBABILITY | COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS | MATHEMATICS, INTERDISCIPLINARY APPLICATIONS | BIOCHEMICAL RESEARCH METHODS | Genomes
Journal Article
Computer, ISSN 0018-9162, 9/2013, pp. 1 - 1
In recent years, whole genome sequencing (WGS) evolved from a futuristic-sounding research project to an increasingly affordable technology for determining... 
Privacy | Sequential analysis | Bioinformatics | Genomics | DNA | Diseases
Journal Article
Proceedings of the 2013 ACM SIGSAC conference on computer & communications security, ISSN 1543-7221, 11/2013, pp. 1141 - 1152
The rapid progress in human-genome sequencing is leading to a high availability of genomic data. This data is notoriously very sensitive and stable in time. It... 
inference algorithms | genomic privacy | metrics | kinship
Conference Proceeding
Journal of Parallel and Distributed Computing, ISSN 0743-7315, 11/2017, Volume 109, pp. 142 - 154
Although Machine to Machine (M2M) networks allow the development of new promising applications, the restricted resources of machines and devices in the M2M... 
Security threats | Countermeasures | Machine to Machine (M2M) communications | OneM2M standard | INTERNET | PRIVACY | MECHANISM | STANDARDS | TRUST MANAGEMENT | SCHEME | AUTHENTICATION | THINGS | COMPUTER SCIENCE, THEORY & METHODS | WIRELESS SENSOR NETWORKS | Access control | Computer programming | Security software
Journal Article
F1000Research, ISSN 2046-1402, 03/2014, Volume 3, pp. 80 - 80
The storage of greater numbers of exomes or genomes raises the question of loss of privacy for the individual and for families if genomic data are not properly... 
Bioinformatics | Science & Medical Policies | Genomics
Journal Article
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.