Search
Search Results
-
COLLAGENE enables privacy-aware federated and collaborative genomic data analysis
Growing regulatory requirements set barriers around genetic data sharing and collaborations. Moreover, existing privacy-aware paradigms are...
-
Secure tumor classification by shallow neural network using homomorphic encryption
BackgroundDisclosure of patients’ genetic information in the process of applying machine learning techniques for tumor classification hinders the...
-
A Novel Genetic Algorithm-Based DES Key Generation Scheme
The data encryption is closely related to our daily lives, especially after the concept of e-commerce has become popular. The main reason is that... -
A secure SNP panel scheme using homomorphically encrypted K-mers without SNP calling on the user side
BackgroundSingle Nucleotide Polymorphism (SNP) in the genome has become crucial information for clinical use. For example, the targeted cancer...
-
Informativeness of the Spectral and Morphometric Characteristics of the Canopy-Gap Structure Based on Remote Sensing Data
AbstractThe differences in morphometric features of the canopy-gap structure of the three dominant forest types in the Valuevsky Forest Park were...
-
Private Epigenetic PaceMaker Detector Using Homomorphic Encryption - Extended Abstract
The Epigenetic Pacemaker (EPM) model uses DNA methylation data to predict human epigenetic age. The methylation values are collected from different... -
Privacy-Preserving Analytics, Processing and Data Management
Typically, data cannot be shared among competing organizations due to confidentiality or regulatory restrictions. We present several technological... -
Aggregation Tree Statistical Computing Based on Functional Encryption
The medical monitoring system is widely used. In the medical monitoring system, each user only possesses one piece of data logging that participates...
-
Shoots as Generators of Hydroplasmic Flows in the Colonial Hydroid Dynamena pumila (L., 1758)
AbstractColonial hydroids are a true model of decentralized systems. Their self-regulation is best manifested in the functioning of the distribution...
-
A Way to Improve the Key Recovery Accuracy Based on Dynamic Programming
Key-recovery technology is often used by an adversary to attempt to recover the cryptographic key of an encryption scheme. The most obvious...
-
Privacy Preserving Query over Encrypted Multidimensional Massive Data in Cloud Storage
Cloud storage is widely used in massive data outsourcing, but how to efficiently query encrypted multidimensional data stored in an untrusted cloud...
-
Towards practical privacy-preserving genome-wide association study
BackgroundThe deployment of Genome-wide association studies (GWASs) requires genomic information of a large population to produce reliable results....
-
Secure pairing with wearable devices by using ambient sound and light
Wearable devices usually work together with smart phones. To ensure only legitimate smart phones can read the data, they must conduct pairing to...
-
Estimation of Linkages between Biometric Indexes of Forests and Pattern of Canopy Spaces on Super-High-Resolution Satellite Images
This paper presents the results of studying a promising area related to the remote assessment of canopy spaces in forests by thresholding methods of...
-
Ciphertext-policy attribute-based encryption for general circuits from bilinear maps
In this paper, we present the first ciphertext-policy attribute-based encryption (CP-ABE) scheme for polynomial-size general circuits based on...
-
Trust attestation mechanism for the sensing layer nodes of Internet of Things
The main function of Internet of Things is to collect and transmit data. At present, the data transmission in Internet of Things lacks effective...
-
Privacy-preserving search for chemical compound databases
BackgroundSearching for similar compounds in a database is the most important process for in-silico drug screening. Since a query compound is an...
-
One-to-any command and control model: Precisely coordinated operation on uncooperative controlled nodes
New precisely cooperative attacks, such as the coordinated cross plane session termination (CXPST) attack, need thousands upon thousands machines to...
-
A hierarchical attribute-based encryption scheme
According to the relation of an attribute set and its subset, the author presents a hierarchical attribute-based encryption scheme in which a secret...
-
A certificateless threshold public key encryption scheme
The decryption participant’s private key share for decryption is delegated by key generation center in the threshold IBE scheme. However, a key...