We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 31 results
  1. COLLAGENE enables privacy-aware federated and collaborative genomic data analysis

    Growing regulatory requirements set barriers around genetic data sharing and collaborations. Moreover, existing privacy-aware paradigms are...

    Wentao Li, Miran Kim, ... Arif Harmanci in Genome Biology
    Article Open access 11 September 2023
  2. Secure tumor classification by shallow neural network using homomorphic encryption

    Background

    Disclosure of patients’ genetic information in the process of applying machine learning techniques for tumor classification hinders the...

    Seungwan Hong, Jai Hyun Park, ... Jung Hee Cheon in BMC Genomics
    Article Open access 09 April 2022
  3. A Novel Genetic Algorithm-Based DES Key Generation Scheme

    The data encryption is closely related to our daily lives, especially after the concept of e-commerce has become popular. The main reason is that...
    Min-Yan Tsai, Hsin-Hung Cho, ... Wei-Min Chen in Bio-inspired Information and Communication Technologies
    Conference paper 2020
  4. A secure SNP panel scheme using homomorphically encrypted K-mers without SNP calling on the user side

    Background

    Single Nucleotide Polymorphism (SNP) in the genome has become crucial information for clinical use. For example, the targeted cancer...

    Sungjoon Park, Minsu Kim, ... Sun Kim in BMC Genomics
    Article Open access 04 April 2019
  5. Informativeness of the Spectral and Morphometric Characteristics of the Canopy-Gap Structure Based on Remote Sensing Data

    Abstract

    The differences in morphometric features of the canopy-gap structure of the three dominant forest types in the Valuevsky Forest Park were...

    A. V. Komarov, D. V. Ershov, E. V. Tikhonova in Contemporary Problems of Ecology
    Article 29 December 2021
  6. Private Epigenetic PaceMaker Detector Using Homomorphic Encryption - Extended Abstract

    The Epigenetic Pacemaker (EPM) model uses DNA methylation data to predict human epigenetic age. The methylation values are collected from different...
    Meir Goldenberg, Sagi Snir, Adi Akavia in Bioinformatics Research and Applications
    Conference paper 2022
  7. Privacy-Preserving Analytics, Processing and Data Management

    Typically, data cannot be shared among competing organizations due to confidentiality or regulatory restrictions. We present several technological...
    Kalmer Keerup, Dan Bogdanov, ... Per Gunnar Auran in Big Data in Bioeconomy
    Chapter Open access 2021
  8. Aggregation Tree Statistical Computing Based on Functional Encryption

    The medical monitoring system is widely used. In the medical monitoring system, each user only possesses one piece of data logging that participates...

    Guangli **ang, Dengjia Wang, ... Ankang Li in Wuhan University Journal of Natural Sciences
    Article 20 March 2019
  9. Shoots as Generators of Hydroplasmic Flows in the Colonial Hydroid Dynamena pumila (L., 1758)

    Abstract

    Colonial hydroids are a true model of decentralized systems. Their self-regulation is best manifested in the functioning of the distribution...

    N. N. Marfenin, V. S. Dementyev in Biology Bulletin Reviews
    Article 01 September 2021
  10. A Way to Improve the Key Recovery Accuracy Based on Dynamic Programming

    Key-recovery technology is often used by an adversary to attempt to recover the cryptographic key of an encryption scheme. The most obvious...

    Shuanghe Peng, Qiaofeng Zhou, Peiyao Liu in Wuhan University Journal of Natural Sciences
    Article 04 December 2018
  11. Privacy Preserving Query over Encrypted Multidimensional Massive Data in Cloud Storage

    Cloud storage is widely used in massive data outsourcing, but how to efficiently query encrypted multidimensional data stored in an untrusted cloud...

    Guangli **ang, **ang Lin, ... Beilei Li in Wuhan University Journal of Natural Sciences
    Article 19 March 2018
  12. Towards practical privacy-preserving genome-wide association study

    Background

    The deployment of Genome-wide association studies (GWASs) requires genomic information of a large population to produce reliable results....

    Charlotte Bonte, Eleftheria Makri, ... Frederik Vercauteren in BMC Bioinformatics
    Article Open access 20 December 2018
  13. Secure pairing with wearable devices by using ambient sound and light

    Wearable devices usually work together with smart phones. To ensure only legitimate smart phones can read the data, they must conduct pairing to...

    Dong Liu, **g Chen, ... Zairong Tian in Wuhan University Journal of Natural Sciences
    Article 15 July 2017
  14. Estimation of Linkages between Biometric Indexes of Forests and Pattern of Canopy Spaces on Super-High-Resolution Satellite Images

    This paper presents the results of studying a promising area related to the remote assessment of canopy spaces in forests by thresholding methods of...

    V. M. Zhirin, S. V. Knyazeva, S. P. Eidlina in Contemporary Problems of Ecology
    Article 01 December 2018
  15. Ciphertext-policy attribute-based encryption for general circuits from bilinear maps

    In this paper, we present the first ciphertext-policy attribute-based encryption (CP-ABE) scheme for polynomial-size general circuits based on...

    Article 11 March 2017
  16. Trust attestation mechanism for the sensing layer nodes of Internet of Things

    The main function of Internet of Things is to collect and transmit data. At present, the data transmission in Internet of Things lacks effective...

    Article 15 July 2017
  17. Privacy-preserving search for chemical compound databases

    Background

    Searching for similar compounds in a database is the most important process for in-silico drug screening. Since a query compound is an...

    Kana Shimizu, Koji Nuida, ... Kiyoshi Asai in BMC Bioinformatics
    Article Open access 09 December 2015
  18. One-to-any command and control model: Precisely coordinated operation on uncooperative controlled nodes

    New precisely cooperative attacks, such as the coordinated cross plane session termination (CXPST) attack, need thousands upon thousands machines to...

    Han Qiu, Yufeng Li, ... Junhu Zhu in Wuhan University Journal of Natural Sciences
    Article 07 November 2015
  19. A hierarchical attribute-based encryption scheme

    According to the relation of an attribute set and its subset, the author presents a hierarchical attribute-based encryption scheme in which a secret...

    Article 25 June 2013
  20. A certificateless threshold public key encryption scheme

    The decryption participant’s private key share for decryption is delegated by key generation center in the threshold IBE scheme. However, a key...

    Article 01 June 2012
Did you find what you were looking for? Share feedback.