BLOOM: BLoom filter based oblivious outsourced matchings
dc.bibliographicCitation.firstPage | 44 | eng |
dc.bibliographicCitation.issue | Suppl. 2 | eng |
dc.bibliographicCitation.journalTitle | BMC Medical Genomics | eng |
dc.bibliographicCitation.volume | 10 | eng |
dc.contributor.author | Ziegeldorf, Jan Henrik | |
dc.contributor.author | Pennekamp, Jan | |
dc.contributor.author | Hellmanns, David | |
dc.contributor.author | Schwinger, Felix | |
dc.contributor.author | Kunze, Ike | |
dc.contributor.author | Henze, Martin | |
dc.contributor.author | Hiller, Jens | |
dc.contributor.author | Matzutt, Roman | |
dc.contributor.author | Wehrle, Klaus | |
dc.date.accessioned | 2022-04-08T09:22:55Z | |
dc.date.available | 2022-04-08T09:22:55Z | |
dc.date.issued | 2017 | |
dc.description.abstract | Whole genome sequencing has become fast, accurate, and cheap, paving the way towards the large-scale collection and processing of human genome data. Unfortunately, this dawning genome era does not only promise tremendous advances in biomedical research but also causes unprecedented privacy risks for the many. Handling storage and processing of large genome datasets through cloud services greatly aggravates these concerns. Current research efforts thus investigate the use of strong cryptographic methods and protocols to implement privacy-preserving genomic computations. | eng |
dc.description.version | publishedVersion | eng |
dc.identifier.uri | https://oa.tib.eu/renate/handle/123456789/8624 | |
dc.identifier.uri | https://doi.org/10.34657/7662 | |
dc.language.iso | eng | eng |
dc.relation.doi | https://doi.org/10.1186/s12920-017-0277-y | |
dc.relation.essn | 1755-8794 | |
dc.rights.license | CC BY 4.0 Unported | eng |
dc.rights.uri | http://creativecommons.org/licenses/by/4.0/ | eng |
dc.subject.ddc | 610 | eng |
dc.subject.ddc | 004 | eng |
dc.subject.other | Bloom filters | eng |
dc.subject.other | Homomorphic encryption | eng |
dc.subject.other | Secure outsourcing | eng |
dc.title | BLOOM: BLoom filter based oblivious outsourced matchings | eng |
dc.type | Article | eng |
dc.type | Text | eng |
dcterms.event | 5th iDASH Privacy and Security Workshop 2016, 11.11.2016, Chicago, IL | |
tib.accessRights | openAccess | eng |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- s12920-017-0277-y.pdf
- Size:
- 871.66 KB
- Format:
- Adobe Portable Document Format
- Description: