{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:23:38Z","timestamp":1740140618803,"version":"3.37.3"},"reference-count":35,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2023,3,1]],"date-time":"2023-03-01T00:00:00Z","timestamp":1677628800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,3,1]],"date-time":"2023-03-01T00:00:00Z","timestamp":1677628800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,3,1]],"date-time":"2023-03-01T00:00:00Z","timestamp":1677628800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2016YFC1000307"],"award-info":[{"award-number":["2016YFC1000307"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61971021","61571024"],"award-info":[{"award-number":["61971021","61571024"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004750","name":"Aeronautical Science Foundation of China","doi-asserted-by":"publisher","award":["2018ZC51016"],"award-info":[{"award-number":["2018ZC51016"]}],"id":[{"id":"10.13039\/501100004750","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE\/ACM Trans. Comput. Biol. and Bioinf."],"published-print":{"date-parts":[[2023,3,1]]},"DOI":"10.1109\/tcbb.2022.3178446","type":"journal-article","created":{"date-parts":[[2022,6,6]],"date-time":"2022-06-06T20:10:59Z","timestamp":1654546259000},"page":"1457-1468","source":"Crossref","is-referenced-by-count":0,"title":["Secure Counting Query Protocol for Genomic Data"],"prefix":"10.1109","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3438-6442","authenticated-orcid":false,"given":"Yatong","family":"Jiang","sequence":"first","affiliation":[{"name":"School of Cyber Science and Technology, Beihang University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2369-1521","authenticated-orcid":false,"given":"Tao","family":"Shang","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, Beihang University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2965-3518","authenticated-orcid":false,"given":"Jianwei","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, Beihang University, Beijing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1360\/N972014-00895"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2767007"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pgen.1000167"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653726"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.4"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1126\/science.1229566"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1711125114"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TCBB.2017.2709740"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1986.25"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TITB.2007.908465"},{"key":"ref11","first-page":"1","article-title":"Large-scale privacy-preserving mapping of human genomic sequences on hybrid clouds","volume-title":"Proc. 19th Netw. Distrib. Syst. Secur. Symp.","author":"Chen"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2013.6831486"},{"key":"ref13","first-page":"606","article-title":"Privacy-preserving computation of disease risk by using genomic, clinical, and environmental data","volume-title":"Proc. USENIX Workshop Health Inf. Technol.","author":"Ayday"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2517840.2517849"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.34"},{"key":"ref16","first-page":"1","article-title":"Learning privacy-preserving genome-wide association studies on cloud environment using fully homomorphic encryption","volume-title":"Proc. 4th iDASH Privacy Workshop","author":"Lu"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1186\/1472-6947-15-S5-S3"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2011.12"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1186\/1472-6947-15-S5-S5"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1186\/1472-6947-15-S5-S2"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2016.2625299"},{"article-title":"Scotch: Secure counting of encrypted genomic data using a hybrid approach","volume-title":"Proc. AMIA Annu. Symp.","author":"Chenghong","key":"ref22"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2018.03.003"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2018.112102323"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196535"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.cmpb.2018.08.007"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329800"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2017.2682860"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.21236\/ADA464967"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48051-9_15"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btw050"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TITB.2007.908465"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TITB.2011.2171701"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2018.03.003"}],"container-title":["IEEE\/ACM Transactions on Computational Biology and Bioinformatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8857\/10091711\/09789428.pdf?arnumber=9789428","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T02:48:47Z","timestamp":1706755727000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9789428\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,1]]},"references-count":35,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tcbb.2022.3178446","relation":{},"ISSN":["1545-5963","1557-9964","2374-0043"],"issn-type":[{"type":"print","value":"1545-5963"},{"type":"electronic","value":"1557-9964"},{"type":"electronic","value":"2374-0043"}],"subject":[],"published":{"date-parts":[[2023,3,1]]}}}