{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,26]],"date-time":"2025-10-26T13:40:40Z","timestamp":1761486040688},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"S5","license":[{"start":{"date-parts":[[2015,12,1]],"date-time":"2015-12-01T00:00:00Z","timestamp":1448928000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["BMC Med Inform Decis Mak"],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1186\/1472-6947-15-s5-s4","type":"journal-article","created":{"date-parts":[[2015,12,22]],"date-time":"2015-12-22T05:04:12Z","timestamp":1450760652000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":33,"title":["Secure distributed genome analysis for GWAS and sequence comparison computation"],"prefix":"10.1186","volume":"15","author":[{"given":"Yihua","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Marina","family":"Blanton","sequence":"additional","affiliation":[]},{"given":"Ghada","family":"Almashaqbeh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,21]]},"reference":[{"key":"928_CR1","volume-title":"ACM Symposium on Information, Computer and Communications Security (ASIACCS)","author":"M Blanton","year":"2012","unstructured":"Blanton M, Aguiar E: Private and oblivious set and multiset operations. ACM Symposium on Information, Computer and Communications Security (ASIACCS). 2012"},{"key":"928_CR2","first-page":"307","volume-title":"AFIPS Spring Joint Computer Conference","author":"K Batcher","year":"1968","unstructured":"Batcher K: Sorting networks and their applications. AFIPS Spring Joint Computer Conference. 1968, 307-314."},{"key":"928_CR3","unstructured":"iDASH 2015 Secure Genome Analysis Competition: Competition Tasks. [\n                    http:\/\/www.humangenomeprivacy.org\/2015\/competition-tasks.html\n                    \n                  ]"},{"key":"928_CR4","unstructured":"Tang H, Jiang X, Wang X, Wang S, Sofia H, Fox D, Lauter K, Malin B, Telenti A, Xiong L, Ohno-Machado L: Protecting Genomic Data Analytics in the Cloud: State of the Art and Opportunities."},{"issue":"11","key":"928_CR5","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir A: How to share a secret. Communications of the ACM. 1979, 22 (11): 612-613.","journal-title":"Communications of the ACM"},{"key":"928_CR6","first-page":"101","volume-title":"ACM Symposium on Principles of Distributed Computing (PODC)","author":"R Gennaro","year":"1998","unstructured":"Gennaro R, Rabin M, Rabin T: Simplified VSS and fast-track multiparty computations with applications to threshold cryptography. ACM Symposium on Principles of Distributed Computing (PODC). 1998, 101-111."},{"issue":"1","key":"928_CR7","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/s001459910006","volume":"13","author":"R Canetti","year":"2000","unstructured":"Canetti R: Security and composition of multiparty cryptographic protocols. Journal of Cryptology. 2000, 13 (1): 143-202.","journal-title":"Journal of Cryptology"},{"key":"928_CR8","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1007\/978-3-642-15317-4_13","volume-title":"Security and Cryptography for Networks (SCN)","author":"O Catrina","year":"2010","unstructured":"Catrina O, de Hoogh S: Improved primitives for secure multiparty integer computation. Security and Cryptography for Networks (SCN). 2010, 182-199."},{"key":"928_CR9","volume-title":"Network and Distributed System Security Symposuim (NDSS)","author":"M Aliasgari","year":"2013","unstructured":"Aliasgari M, Blanton M, Zhang Y, Steele A: Secure computation on floating point numbers. Network and Distributed System Security Symposuim (NDSS). 2013"},{"key":"928_CR10","first-page":"162","volume-title":"IEEE Symposium on Foundations of Computer Science","author":"A Yao","year":"1986","unstructured":"Yao A: How to generate and exchange secrets. IEEE Symposium on Foundations of Computer Science. 1986, 162-167."},{"key":"928_CR11","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/978-3-642-14577-3_13","volume-title":"Financial Cryptography and Data Security (FC)","author":"E De Cristofaro","year":"2010","unstructured":"De Cristofaro E, Tsudik G: Practical private set intersection protocols with linear complexity. Financial Cryptography and Data Security (FC). 2010, 143-159."},{"key":"928_CR12","first-page":"287","volume-title":"USENIX Security Symposium","author":"D Malkhi","year":"2004","unstructured":"Malkhi D, Nisan N, Pinkas B, Sella Y: Fairplay - a secure two-party computation system. USENIX Security Symposium. 2004, 287-302."},{"key":"928_CR13","first-page":"192","volume-title":"European Symposium On Research In Computer Security (ESORICS)","author":"D Bogdanov","year":"2008","unstructured":"Bogdanov D, Laur S, Willemson J: Sharemind: A framework for fast privacy-preserving computations. European Symposium On Research In Computer Security (ESORICS). 2008, 192-206."},{"key":"928_CR14","first-page":"813","volume-title":"ACM Conference on Computer and Communications Security (CCS)","author":"Y Zhang","year":"2013","unstructured":"Zhang Y, Steele A, Blanton M: PICCO: A general-purpose compiler for private distributed computation. ACM Conference on Computer and Communications Security (CCS). 2013, 813-826."},{"key":"928_CR15","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/978-3-642-14577-3_6","volume-title":"Financial Cryptography and Data Security (FC)","author":"O Catrina","year":"2010","unstructured":"Catrina O, Saxena A: Secure computation with fixed-point numbers. Financial Cryptography and Data Security (FC). 2010, 35-50."},{"key":"928_CR16","unstructured":"Bitonic Sorting Network for n Not a Power Of 2. [\n                    http:\/\/www.iti.fh-flensburg.de\/lang\/algorithmen\/sortieren\/bitonic\/oddn.htm\n                    \n                  ]"},{"key":"928_CR17","unstructured":"GENI: Global Environment for Network Innovations. [\n                    http:\/\/www.geni.net\n                    \n                  ]"}],"container-title":["BMC Medical Informatics and Decision Making"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1472-6947-15-S5-S4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/1472-6947-15-S5-S4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1472-6947-15-S5-S4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,23]],"date-time":"2019-01-23T08:06:39Z","timestamp":1548230799000},"score":1,"resource":{"primary":{"URL":"https:\/\/bmcmedinformdecismak.biomedcentral.com\/articles\/10.1186\/1472-6947-15-S5-S4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12]]},"references-count":17,"journal-issue":{"issue":"S5","published-print":{"date-parts":[[2015,12]]}},"alternative-id":["928"],"URL":"https:\/\/doi.org\/10.1186\/1472-6947-15-s5-s4","relation":{},"ISSN":["1472-6947"],"issn-type":[{"value":"1472-6947","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,12]]},"assertion":[{"value":"21 December 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"S4"}}