{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T12:53:00Z","timestamp":1773838380756,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":80,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,10,17]],"date-time":"2011-10-17T00:00:00Z","timestamp":1318809600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,10,17]]},"DOI":"10.1145\/2046707.2046785","type":"proceedings-article","created":{"date-parts":[[2011,10,18]],"date-time":"2011-10-18T13:02:00Z","timestamp":1318942920000},"page":"691-702","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":164,"title":["Countering GATTACA"],"prefix":"10.1145","author":[{"given":"Pierre","family":"Baldi","sequence":"first","affiliation":[{"name":"University of California, Irvine, Irvine, CA, USA"}]},{"given":"Roberta","family":"Baronio","sequence":"additional","affiliation":[{"name":"University of California, Irvine, Irvine, CA, USA"}]},{"given":"Emiliano","family":"De Cristofaro","sequence":"additional","affiliation":[{"name":"University of California, Irvine, Irvine, CA, USA"}]},{"given":"Paolo","family":"Gasti","sequence":"additional","affiliation":[{"name":"University of California, Irvine, Irvine, CA, USA"}]},{"given":"Gene","family":"Tsudik","sequence":"additional","affiliation":[{"name":"University of California, Irvine, Irvine, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2011,10,17]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Special section on human genetics: With your genes? Take one of these, three times a day. Nature, 425(6960)","author":"Abbott A.","year":"2003","unstructured":"A. Abbott . Special section on human genetics: With your genes? Take one of these, three times a day. Nature, 425(6960) , 2003 . A. Abbott. Special section on human genetics: With your genes? Take one of these, three times a day. Nature, 425(6960), 2003."},{"key":"e_1_3_2_1_2_1","volume-title":"The Genome Sequence of Drosophila melanogaster. Science, 287(5461)","author":"Adams M.","year":"2000","unstructured":"M. Adams The Genome Sequence of Drosophila melanogaster. Science, 287(5461) , 2000 . M. Adams et al. The Genome Sequence of Drosophila melanogaster. Science, 287(5461), 2000."},{"key":"e_1_3_2_1_3_1","volume-title":"Restriction fragment length polymorphisms and genetic improvement of agricultural species. Euphytica, 35(1)","author":"Beckmann J.","year":"1986","unstructured":"J. Beckmann and M. Soller . Restriction fragment length polymorphisms and genetic improvement of agricultural species. Euphytica, 35(1) , 1986 . J. Beckmann and M. Soller. Restriction fragment length polymorphisms and genetic improvement of agricultural species. Euphytica, 35(1), 1986."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/1875947.1875953"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btp319"},{"key":"e_1_3_2_1_6_1","unstructured":"F. Bruekers S. Katzenbeisser K. Kursawe and P. Tuyls. Privacy-Preserving Matching of DNA Profiles. http:\/\/eprint.iacr.org\/2008\/203 2008.  F. Bruekers S. Katzenbeisser K. Kursawe and P. Tuyls. Privacy-Preserving Matching of DNA Profiles. http:\/\/eprint.iacr.org\/2008\/203 2008."},{"key":"e_1_3_2_1_7_1","volume-title":"Performance of the SNPforID 52 SNP-plex assay in paternity testing. Forensic Science International: Genetics, 2(4)","author":"B\u00f8rsting C.","year":"2008","unstructured":"C. B\u00f8rsting Performance of the SNPforID 52 SNP-plex assay in paternity testing. Forensic Science International: Genetics, 2(4) , 2008 . C. B\u00f8rsting et al. Performance of the SNPforID 52 SNP-plex assay in paternity testing. Forensic Science International: Genetics, 2(4), 2008."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03549-4_7"},{"key":"e_1_3_2_1_9_1","volume-title":"Genetic Engineering & Biotechnology News","author":"Carlson B.","year":"2008","unstructured":"B. Carlson . SNPs -- A shortcut to personalized medicine . Genetic Engineering & Biotechnology News , 2008 . B. Carlson. SNPs -- A shortcut to personalized medicine. Genetic Engineering & Biotechnology News, 2008."},{"key":"e_1_3_2_1_10_1","unstructured":"Center for Applied Genomics University of Toronto. Database of Genomic Variants. http:\/\/projects.tcag.ca\/variation 2011.  Center for Applied Genomics University of Toronto. Database of Genomic Variants. http:\/\/projects.tcag.ca\/variation 2011."},{"key":"e_1_3_2_1_11_1","volume-title":"Implications of the Human Genome Project for medical science. Jama, 285(5)","author":"Collins F.","year":"2001","unstructured":"F. Collins and V. McKusick . Implications of the Human Genome Project for medical science. Jama, 285(5) , 2001 . F. Collins and V. McKusick. Implications of the Human Genome Project for medical science. Jama, 285(5), 2001."},{"key":"e_1_3_2_1_12_1","author":"Cunningham L.","year":"2003","unstructured":"L. Cunningham . High-stakes Test. Daily Business Review , 2003 . L. Cunningham. High-stakes Test. Daily Business Review, 2003.","journal-title":"High-stakes Test. Daily Business Review"},{"key":"e_1_3_2_1_13_1","volume-title":"Data structures and compression algorithms for high-throughput sequencing technologies. BMC bioinformatics, 11(1)","author":"Daily K.","year":"2010","unstructured":"K. Daily Data structures and compression algorithms for high-throughput sequencing technologies. BMC bioinformatics, 11(1) , 2010 . K. Daily et al. Data structures and compression algorithms for high-throughput sequencing technologies. BMC bioinformatics, 11(1), 2010."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/2396231.2396270"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17373-8_13"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14577-3_13"},{"key":"e_1_3_2_1_17_1","volume-title":"Fast and Private Computation of Set Intersection Cardinality. Cryptology ePrint Archive","author":"De Cristofaro E.","year":"2011","unstructured":"E. De Cristofaro and G. Tsudik . Fast and Private Computation of Set Intersection Cardinality. Cryptology ePrint Archive , 2011 . E. De Cristofaro and G. Tsudik. Fast and Private Computation of Set Intersection Cardinality. Cryptology ePrint Archive, 2011."},{"key":"e_1_3_2_1_18_1","volume-title":"Current protocols in human genetics","author":"Dracopoli N.","year":"1994","unstructured":"N. Dracopoli , J. Haines , and B. Korf . Current protocols in human genetics . John Wiley & Sons , 1994 . N. Dracopoli, J. Haines, and B. Korf. Current protocols in human genetics. John Wiley & Sons, 1994."},{"key":"e_1_3_2_1_19_1","volume-title":"A map of human genome variation from population-scale sequencing. Nature, 467(7319)","author":"Durbin R.","year":"2010","unstructured":"R. Durbin A map of human genome variation from population-scale sequencing. Nature, 467(7319) , 2010 . R. Durbin et al. A map of human genome variation from population-scale sequencing. Nature, 467(7319), 2010."},{"key":"e_1_3_2_1_20_1","first-page":"28","article-title":"How Research Will Adapt to HIPAA: A View from Within the Healthcare Delivery System","author":"Durham M.","year":"2002","unstructured":"M. Durham . How Research Will Adapt to HIPAA: A View from Within the Healthcare Delivery System . Am. JL and Med. , 28 , 2002 . M. Durham. How Research Will Adapt to HIPAA: A View from Within the Healthcare Delivery System. Am. JL and Med., 28, 2002.","journal-title":"Am. JL and Med."},{"key":"e_1_3_2_1_21_1","volume-title":"A public key cryptosystem and a signature scheme based on discrete logarithms","author":"ElGamal T.","year":"1985","unstructured":"T. ElGamal . A public key cryptosystem and a signature scheme based on discrete logarithms . IEEE transactions on Information Theory , 31(4), 1985 . T. ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE transactions on Information Theory, 31(4), 1985."},{"key":"e_1_3_2_1_22_1","volume-title":"International Symposium on Human Identification","author":"Endean D.","year":"1989","unstructured":"D. Endean . RFLP analysis for paternity testing: observations and caveats . In International Symposium on Human Identification , 1989 . D. Endean. RFLP analysis for paternity testing: observations and caveats. In International Symposium on Human Identification, 1989."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1011687108"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30576-7_17"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_1"},{"key":"e_1_3_2_1_26_1","unstructured":"Genetics Home Reference. HBB Gene. http:\/\/ghr.nlm.nih.gov\/gene\/HBB.  Genetics Home Reference. HBB Gene. http:\/\/ghr.nlm.nih.gov\/gene\/HBB."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13013-7_20"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pgen.0020150"},{"key":"e_1_3_2_1_29_1","volume-title":"Genomic and personalized medicine: foundations and applications. Translational Research, 154(6)","author":"Ginsburg G.","year":"2009","unstructured":"G. Ginsburg and H. Willard . Genomic and personalized medicine: foundations and applications. Translational Research, 154(6) , 2009 . G. Ginsburg and H. Willard. Genomic and personalized medicine: foundations and applications. Translational Research, 154(6), 2009."},{"key":"e_1_3_2_1_30_1","volume-title":"Science","author":"Goffeau A.","year":"1996","unstructured":"A. Goffeau Life with 6000 Genes . Science , 1996 . A. Goffeau et al. Life with 6000 Genes. Science, 1996."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511721656","volume-title":"Foundations of cryptography: Basic applications","author":"Goldreich O.","year":"2004","unstructured":"O. Goldreich . Foundations of cryptography: Basic applications , chapter 7.2.2. Cambridge Univ Press , 2004 . O. Goldreich. Foundations of cryptography: Basic applications, chapter 7.2.2. Cambridge Univ Press, 2004."},{"key":"e_1_3_2_1_32_1","first-page":"16","article-title":"On the security of modular exponentiation with application to the construction of pseudorandom generators","author":"Goldreich O.","year":"2000","unstructured":"O. Goldreich , R. Israel , and V. Rosen . On the security of modular exponentiation with application to the construction of pseudorandom generators . Journal of Cryptology , 16 , 2000 . O. Goldreich, R. Israel, and V. Rosen. On the security of modular exponentiation with application to the construction of pseudorandom generators. Journal of Cryptology, 16, 2000.","journal-title":"Journal of Cryptology"},{"key":"e_1_3_2_1_33_1","volume-title":"The molecular mechanism underlying Roberts syndrome involves loss of ESCO2 acetyltransferase activity. Human molecular genetics, 17(14)","author":"Gordillo M.","year":"2008","unstructured":"M. Gordillo The molecular mechanism underlying Roberts syndrome involves loss of ESCO2 acetyltransferase activity. Human molecular genetics, 17(14) , 2008 . M. Gordillo et al. The molecular mechanism underlying Roberts syndrome involves loss of ESCO2 acetyltransferase activity. Human molecular genetics, 17(14), 2008."},{"key":"e_1_3_2_1_34_1","volume-title":"A polymorphic DNA marker genetically linked to Huntington's disease. Nature, 306(5940)","author":"Gusella J.","year":"1983","unstructured":"J. Gusella A polymorphic DNA marker genetically linked to Huntington's disease. Nature, 306(5940) , 1983 . J. Gusella et al. A polymorphic DNA marker genetically linked to Huntington's disease. Nature, 306(5940), 1983."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/1802614.1802628"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17373-8_12"},{"key":"e_1_3_2_1_37_1","volume-title":"British Journal of Cancer","author":"Ho J.","year":"2010","unstructured":"J. Ho , Choi, Replication study of SNP associations for colorectal cancer in Hong Kong Chinese . British Journal of Cancer , 2010 . J. Ho, Choi, et al. Replication study of SNP associations for colorectal cancer in Hong Kong Chinese. British Journal of Cancer, 2010."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2006.02.010"},{"key":"e_1_3_2_1_39_1","volume-title":"May","author":"Hsi-Yang Fritz M.","year":"2011","unstructured":"M. Hsi-Yang Fritz , R. Leinonen , G. Cochrane , and E. Birney . Efficient storage of high throughput dna sequencing data using reference-based compression. Genome Research, 21(5) , May 2011 . M. Hsi-Yang Fritz, R. Leinonen, G. Cochrane, and E. Birney. Efficient storage of high throughput dna sequencing data using reference-based compression. Genome Research, 21(5), May 2011."},{"key":"e_1_3_2_1_40_1","first-page":"409","article-title":"Initial sequencing and analysis of the human genome","author":"International Human Genome Sequencing Consortium","year":"2001","unstructured":"International Human Genome Sequencing Consortium . Initial sequencing and analysis of the human genome . Nature , 409 , 2001 . International Human Genome Sequencing Consortium. Initial sequencing and analysis of the human genome. Nature, 409, 2001.","journal-title":"Nature"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.5555\/1885535.1885573"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.34"},{"key":"e_1_3_2_1_43_1","first-page":"319","article-title":"A plan to capture human diversity in 1000 genomes","author":"Kaiser J.","year":"2008","unstructured":"J. Kaiser . A plan to capture human diversity in 1000 genomes . Science , 319 , 2008 . J. Kaiser. A plan to capture human diversity in 1000 genomes. Science, 319, 2008.","journal-title":"Science"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITB.2007.908465"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1001\/jama.2009.1529"},{"key":"e_1_3_2_1_46_1","volume-title":"Introduction to modern cryptography","author":"Katz J.","year":"2008","unstructured":"J. Katz and Y. Lindell . Introduction to modern cryptography . Chapman & Hall\/CRC , 2008 . J. Katz and Y. Lindell. Introduction to modern cryptography. Chapman & Hall\/CRC, 2008."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866361"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/11535218_15"},{"key":"e_1_3_2_1_49_1","first-page":"108","article-title":"The New HIPAA (Health Insurance Portability and Accountability Act of 1996) Medical Privacy Rule","author":"Kulynych J.","year":"2003","unstructured":"J. Kulynych and D. Korn . The New HIPAA (Health Insurance Portability and Accountability Act of 1996) Medical Privacy Rule . Circulation , 108 , 2003 . J. Kulynych and D. Korn. The New HIPAA (Health Insurance Portability and Accountability Act of 1996) Medical Privacy Rule. Circulation, 108, 2003.","journal-title":"Circulation"},{"key":"e_1_3_2_1_50_1","volume-title":"DNA fingerprinting on trial. Nature, 339(6225)","author":"Lander E.","year":"1989","unstructured":"E. Lander . DNA fingerprinting on trial. Nature, 339(6225) , 1989 . E. Lander. DNA fingerprinting on trial. Nature, 339(6225), 1989."},{"key":"e_1_3_2_1_51_1","volume-title":"Soviet Physics Doklady","volume":"10","author":"Levenshtein V.","year":"1966","unstructured":"V. Levenshtein . Binary codes capable of correcting deletions, insertions, and reversals . In Soviet Physics Doklady , volume 10 , 1966 . V. Levenshtein. Binary codes capable of correcting deletions, insertions, and reversals. In Soviet Physics Doklady, volume 10, 1966."},{"key":"e_1_3_2_1_52_1","volume-title":"The diploid genome sequence of an individual human. PLoS biology, 5(10)","author":"Levy S.","year":"2007","unstructured":"S. Levy The diploid genome sequence of an individual human. PLoS biology, 5(10) , 2007 . S. Levy et al. The diploid genome sequence of an individual human. PLoS biology, 5(10), 2007."},{"key":"e_1_3_2_1_53_1","volume-title":"Human genetics: concepts and applications","author":"Lewis R.","year":"2003","unstructured":"R. Lewis and A. Reynolds . Human genetics: concepts and applications . McGraw-Hill , 2003 . R. Lewis and A. Reynolds. Human genetics: concepts and applications. McGraw-Hill, 2003."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1197\/jamia.M1603"},{"key":"e_1_3_2_1_55_1","volume-title":"Currents in Contemporary Ethics: Meeting the Growing Demands of Genetic Research. JL Med. & Ethics, 34","author":"McGuire A.","year":"2006","unstructured":"A. McGuire and R. Gibbs . Currents in Contemporary Ethics: Meeting the Growing Demands of Genetic Research. JL Med. & Ethics, 34 , 2006 . A. McGuire and R. Gibbs. Currents in Contemporary Ethics: Meeting the Growing Demands of Genetic Research. JL Med. & Ethics, 34, 2006."},{"key":"e_1_3_2_1_56_1","volume-title":"Mendelian inheritance in man: a catalog of human genes and genetic disorders","author":"McKusick V.","year":"1994","unstructured":"V. McKusick and S. Antonarakis . Mendelian inheritance in man: a catalog of human genes and genetic disorders . John Hopkins University Press , 1994 . V. McKusick and S. Antonarakis. Mendelian inheritance in man: a catalog of human genes and genetic disorders. John Hopkins University Press, 1994."},{"key":"e_1_3_2_1_57_1","volume-title":"CRC","author":"Menezes A.","year":"1997","unstructured":"A. Menezes , P. Van Oorschot , and S. Vanstone . Handbook of applied cryptography . CRC , 1997 . A. Menezes, P. Van Oorschot, and S. Vanstone. Handbook of applied cryptography. CRC, 1997."},{"key":"e_1_3_2_1_58_1","volume-title":"Proceedings of the National Academy of Sciences, 97(6)","author":"Migueles S.","year":"2000","unstructured":"S. Migueles HLA B* 5701 is highly associated with restriction of virus replication in a subgroup of HIV-infected long term nonprogressors . Proceedings of the National Academy of Sciences, 97(6) , 2000 . S. Migueles et al. HLA B* 5701 is highly associated with restriction of virus replication in a subgroup of HIV-infected long term nonprogressors. Proceedings of the National Academy of Sciences, 97(6), 2000."},{"key":"e_1_3_2_1_59_1","unstructured":"National Center for Biotechnology Information (US). Single Nucleotide Polymorphism Database. http:\/\/www.ncbi.nlm.nih.gov\/projects\/SNP\/.  National Center for Biotechnology Information (US). Single Nucleotide Polymorphism Database. http:\/\/www.ncbi.nlm.nih.gov\/projects\/SNP\/."},{"key":"e_1_3_2_1_60_1","unstructured":"National Center for Biotechnology Information (US). TPMT thiopurine S-methyltransferase. http:\/\/1.usa.gov\/orAYkF.  National Center for Biotechnology Information (US). TPMT thiopurine S-methyltransferase. http:\/\/1.usa.gov\/orAYkF."},{"key":"e_1_3_2_1_61_1","unstructured":"National Center for Biotechnology Information (US). Restriction Fragment Length Polymorphism (RFLP). http:\/\/1.usa.gov\/pha5sw 2011.  National Center for Biotechnology Information (US). Restriction Fragment Length Polymorphism (RFLP). http:\/\/1.usa.gov\/pha5sw 2011."},{"key":"e_1_3_2_1_62_1","volume-title":"http:\/\/1.usa.gov\/oWNiYo","author":"Genome Mapping BI.","year":"2011","unstructured":"NC BI. Genome Mapping . http:\/\/1.usa.gov\/oWNiYo , 2011 . NCBI. Genome Mapping. http:\/\/1.usa.gov\/oWNiYo, 2011."},{"key":"e_1_3_2_1_63_1","volume-title":"The role of hormonal therapy in the management of hormonal-receptor-positive breast cancer with co-expression of her2. Nature Clinical Practice Oncology, 5(9)","author":"Prat A.","year":"2008","unstructured":"A. Prat and J. Baselga . The role of hormonal therapy in the management of hormonal-receptor-positive breast cancer with co-expression of her2. Nature Clinical Practice Oncology, 5(9) , 2008 . A. Prat and J. Baselga. The role of hormonal therapy in the management of hormonal-receptor-positive breast cancer with co-expression of her2. Nature Clinical Practice Oncology, 5(9), 2008."},{"key":"e_1_3_2_1_64_1","volume-title":"http:\/\/scientificmatch.com","year":"2011","unstructured":"ScientificMatch.com. http:\/\/scientificmatch.com , 2011 . ScientificMatch.com. http:\/\/scientificmatch.com, 2011."},{"key":"e_1_3_2_1_65_1","first-page":"311","article-title":"The race for the \\$1000 genome","author":"Service R. F.","year":"2006","unstructured":"R. F. Service . The race for the \\$1000 genome . Science , 311 , 2006 . R. F. Service. The race for the \\$1000 genome. Science, 311, 2006.","journal-title":"Science"},{"key":"e_1_3_2_1_66_1","volume-title":"Nature biotechnology, 26(3)","author":"Siva N.","year":"2008","unstructured":"N. Siva . 100 0 Genomes project. Nature biotechnology, 26(3) , 2008 . N. Siva. 1000 Genomes project. Nature biotechnology, 26(3), 2008."},{"key":"e_1_3_2_1_67_1","first-page":"147","article-title":"Identification of common molecular subsequences","author":"Smith T.","year":"1981","unstructured":"T. Smith and M. Waterman . Identification of common molecular subsequences . Journal of Molecular Biology , 147 , 1981 . T. Smith and M. Waterman. Identification of common molecular subsequences. Journal of Molecular Biology, 147, 1981.","journal-title":"Journal of Molecular Biology"},{"key":"e_1_3_2_1_68_1","volume-title":"The human gene mutation database: 2008 update. Genome Medicine, 1(1)","author":"Stenson P.","year":"2009","unstructured":"P. Stenson The human gene mutation database: 2008 update. Genome Medicine, 1(1) , 2009 . P. Stenson et al. The human gene mutation database: 2008 update. Genome Medicine, 1(1), 2009."},{"key":"e_1_3_2_1_69_1","unstructured":"The Federal Bureau of Investigation. Combined DNA Index System (CODIS). http:\/\/www.fbi.gov\/about-us\/lab\/codis 2011.  The Federal Bureau of Investigation. Combined DNA Index System (CODIS). http:\/\/www.fbi.gov\/about-us\/lab\/codis 2011."},{"key":"e_1_3_2_1_70_1","volume-title":"Isolation and mapping of 62 new RFLP markers on human chromosome 11. American journal of human genetics, 48(2)","author":"Tokino T.","year":"1991","unstructured":"T. Tokino Isolation and mapping of 62 new RFLP markers on human chromosome 11. American journal of human genetics, 48(2) , 1991 . T. Tokino et al. Isolation and mapping of 62 new RFLP markers on human chromosome 11. American journal of human genetics, 48(2), 1991."},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315309"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.5555\/1239367.1239368"},{"key":"e_1_3_2_1_73_1","first-page":"453","article-title":"Genetics bill cruises through senate","author":"Wadman M.","year":"2008","unstructured":"M. Wadman . Genetics bill cruises through senate . Nature , 453 , 2008 . M. Wadman. Genetics bill cruises through senate. Nature, 453, 2008.","journal-title":"Nature"},{"key":"e_1_3_2_1_74_1","volume-title":"The diploid genome sequence of an Asian individual. Nature, 456(7218)","author":"Wang J.","year":"2008","unstructured":"J. Wang The diploid genome sequence of an Asian individual. Nature, 456(7218) , 2008 . J. Wang et al. The diploid genome sequence of an Asian individual. Nature, 456(7218), 2008."},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653703"},{"key":"e_1_3_2_1_76_1","volume-title":"Initial sequencing and comparative analysis of the mouse genome. Nature, 420(6915)","author":"Waterston R.","year":"2002","unstructured":"R. Waterston Initial sequencing and comparative analysis of the mouse genome. Nature, 420(6915) , 2002 . R. Waterston et al. Initial sequencing and comparative analysis of the mouse genome. Nature, 420(6915), 2002."},{"key":"e_1_3_2_1_77_1","volume-title":"Systems biology, proteomics, and the future of health care: toward predictive, preventative, and personalized medicine. Journal of proteome research, 3(2)","author":"Weston A.","year":"2004","unstructured":"A. Weston and L. Hood . Systems biology, proteomics, and the future of health care: toward predictive, preventative, and personalized medicine. Journal of proteome research, 3(2) , 2004 . A. Weston and L. Hood. Systems biology, proteomics, and the future of health care: toward predictive, preventative, and personalized medicine. Journal of proteome research, 3(2), 2004."},{"key":"e_1_3_2_1_78_1","volume-title":"The complete genome of an individual by massively parallel DNA sequencing. Nature, 452(7189)","author":"Wheeler D.","year":"2008","unstructured":"D. Wheeler The complete genome of an individual by massively parallel DNA sequencing. Nature, 452(7189) , 2008 . D. Wheeler et al. The complete genome of an individual by massively parallel DNA sequencing. Nature, 452(7189), 2008."},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1982.88"},{"key":"e_1_3_2_1_80_1","volume-title":"Molecular diagnosis of thiopurine S-methyltransferase deficiency: genetic basis for azathioprine and mercaptopurine intolerance. Annals of internal medicine, 126(8)","author":"Yates C.","year":"1997","unstructured":"C. Yates Molecular diagnosis of thiopurine S-methyltransferase deficiency: genetic basis for azathioprine and mercaptopurine intolerance. Annals of internal medicine, 126(8) , 1997 . C. Yates et al. Molecular diagnosis of thiopurine S-methyltransferase deficiency: genetic basis for azathioprine and mercaptopurine intolerance. Annals of internal medicine, 126(8), 1997."}],"event":{"name":"CCS'11: the ACM Conference on Computer and Communications Security","location":"Chicago Illinois USA","acronym":"CCS'11","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 18th ACM conference on Computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2046707.2046785","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2046707.2046785","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:48:42Z","timestamp":1750240122000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2046707.2046785"}},"subtitle":["efficient and secure testing of fully-sequenced human genomes"],"short-title":[],"issued":{"date-parts":[[2011,10,17]]},"references-count":80,"alternative-id":["10.1145\/2046707.2046785","10.1145\/2046707"],"URL":"https:\/\/doi.org\/10.1145\/2046707.2046785","relation":{},"subject":[],"published":{"date-parts":[[2011,10,17]]},"assertion":[{"value":"2011-10-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}