{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:47:17Z","timestamp":1762004837223},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662533567"},{"type":"electronic","value":"9783662533574"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-662-53357-4_22","type":"book-chapter","created":{"date-parts":[[2016,8,30]],"date-time":"2016-08-30T09:22:01Z","timestamp":1472548921000},"page":"328-341","source":"Crossref","is-referenced-by-count":6,"title":["Cryptographic Solutions for Genomic Privacy"],"prefix":"10.1007","author":[{"given":"Erman","family":"Ayday","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,8,31]]},"reference":[{"key":"22_CR1","unstructured":"http:\/\/www.nytimes.com\/2013\/03\/24\/opinion\/sunday\/the-immortal-life-of-henrietta-lacks-the-sequel.html?pagewanted=all"},{"key":"22_CR2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1127345.1127346","volume":"9","author":"G Ateniese","year":"2006","unstructured":"Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9, 1\u201330 (2006)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"issue":"2","key":"22_CR3","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1109\/MC.2015.59","volume":"48","author":"E Ayday","year":"2015","unstructured":"Ayday, E., Cristofaro, E.D., Tsudik, G., Hubaux, J.-P.: Whole genome sequencing: revolutionary medicine or privacy nightmare. IEEE Comput. Mag. 48(2), 58\u201366 (2015)","journal-title":"IEEE Comput. Mag."},{"key":"22_CR4","unstructured":"Ayday, E., Raisaro, J.L., Mclaren, P.J., Fellay, J., Hubaux, J.-P.: Privacy-preserving computation of disease risk by using genomic, clinical, and environmental data. In: Proceedings of USENIX Security Workshop on Health Information Technologies (HealthTech) (2013)"},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"Ayday, E., Raisaro, J.L., Rougemont, J., Hubaux, J.-P.: Protecting and evaluating genomic privacy in medical tests and personalized medicine. In: WPES 2013 (2013)","DOI":"10.1145\/2517840.2517843"},{"key":"22_CR6","doi-asserted-by":"crossref","unstructured":"Bresson, E., Catalano, D., Pointcheval, D.: A simple public-key cryptosystem with a double trapdoor decryption mechanism and its applications. In: Proceedings of Asiacrypt (2003)","DOI":"10.1007\/978-3-540-40061-5_3"},{"issue":"5961","key":"22_CR7","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1126\/science.1181498","volume":"327","author":"R Drmanac","year":"2010","unstructured":"Drmanac, R., Sparks, A.B., Callow, M.J., Halpern, A.L., Burns, N.L., Kermani, B.G., Carnevali, P., Nazarenko, I., Nilsen, G.B., Yeung, G., et al.: Human genome sequencing using unchained base reads on self-assembling DNA nanoarrays. Science 327(5961), 78\u201381 (2010)","journal-title":"Science"},{"key":"22_CR8","doi-asserted-by":"crossref","unstructured":"Florencio, D., Herley, C.: A large-scale study of web password habits. In: Proceedings of the 16th International Conference on World Wide Web, WWW 2007, pp. 657\u2013666. ACM, New York (2007)","DOI":"10.1145\/1242572.1242661"},{"key":"22_CR9","doi-asserted-by":"crossref","unstructured":"Huang, Z., Ayday, E., Hubaux, J.-P., Fellay, J., Juels, A.: Genoguard: protecting genomic data against brute-force attacks. In: Proceedings of IEEE Symposium on Security and Privacy (2015)","DOI":"10.1109\/SP.2015.34"},{"key":"22_CR10","doi-asserted-by":"crossref","unstructured":"Humbert, M., Ayday, E., Hubaux, J.-P., Telenti, A.: Addressing the concerns of the Lacks family: quantification of kin genomic privacy. In: CCS 2013 (2013)","DOI":"10.1145\/2508859.2516707"},{"key":"22_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1007\/978-3-642-55220-5_17","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2014","author":"A Juels","year":"2014","unstructured":"Juels, A., Ristenpart, T.: honey encryption: security beyond the brute-force bound. In: Nguyen, P.Q., Oswald, E. (eds.) EUROCRYPT 2014. LNCS, vol. 8441, pp. 293\u2013310. Springer, Heidelberg (2014)"},{"key":"22_CR12","doi-asserted-by":"crossref","first-page":"498","DOI":"10.1109\/18.910572","volume":"47","author":"F Kschischang","year":"2001","unstructured":"Kschischang, F., Frey, B., Loeliger, H.A.: Factor graphs and the sum-product algorithm. IEEE Trans. Inf. Theor. 47, 498\u2013519 (2001)","journal-title":"IEEE Trans. Inf. Theor."},{"key":"22_CR13","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1038\/ejhg.2008.198","volume":"17","author":"D Nyholt","year":"2009","unstructured":"Nyholt, D., Yu, C., Visscher, P.: On Jim Watson\u2019s APOE status: genetic information is hard to hide. Eur. J. Hum. Genet. 17, 147\u2013149 (2009)","journal-title":"Eur. J. Hum. Genet."},{"key":"22_CR14","volume-title":"Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference","author":"J Pearl","year":"1988","unstructured":"Pearl, J., Reasoning, P.: Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference. Morgan Kaufmann Publishers Inc., San Francisco (1988)"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-53357-4_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T17:38:45Z","timestamp":1498325925000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-53357-4_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783662533567","9783662533574"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-53357-4_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}