Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Practical secure computation outsourcing: A survey
The rapid development of cloud computing promotes a wide deployment of data and
computation outsourcing to cloud service providers by resource-limited entities. Based on a …
computation outsourcing to cloud service providers by resource-limited entities. Based on a …
[HTML][HTML] Privacy preserving processing of genomic data: A survey
Recently, the rapid advance in genome sequencing technology has led to production of
huge amount of sensitive genomic data. However, a serious privacy challenge is confronted …
huge amount of sensitive genomic data. However, a serious privacy challenge is confronted …
Countering gattaca: efficient and secure testing of fully-sequenced human genomes
Recent advances in DNA sequencing technologies have put ubiquitous availability of fully
sequenced human genomes within reach. It is no longer hard to imagine the day when …
sequenced human genomes within reach. It is no longer hard to imagine the day when …
Addressing the concerns of the lacks family: quantification of kin genomic privacy
The rapid progress in human-genome sequencing is leading to a high availability of
genomic data. This data is notoriously very sensitive and stable in time. It is also highly …
genomic data. This data is notoriously very sensitive and stable in time. It is also highly …
Sedic: privacy-aware data intensive computing on hybrid clouds
The emergence of cost-effective cloud services offers organizations great opportunity to
reduce their cost and increase productivity. This development, however, is hampered by …
reduce their cost and increase productivity. This development, however, is hampered by …
Protecting and evaluating genomic privacy in medical tests and personalized medicine
In this paper, we propose privacy-enhancing technologies for medical tests and
personalized medicine methods that use patients' genomic data. Focusing on genetic …
personalized medicine methods that use patients' genomic data. Focusing on genetic …
Efficient privacy-preserving string search and an application in genomics
Motivation: Personal genomes carry inherent privacy risks and protecting privacy poses
major social and technological challenges. We consider the case where a user searches for …
major social and technological challenges. We consider the case where a user searches for …
[PDF][PDF] Large-Scale Privacy-Preserving Map** of Human Genomic Sequences on Hybrid Clouds.
An operation preceding most human DNA analyses is read map**, which aligns millions
of short sequences (called reads) to a reference genome. This step involves an enormous …
of short sequences (called reads) to a reference genome. This step involves an enormous …
Privacy-preserving processing of raw genomic data
Geneticists prefer to store patients' aligned, raw genomic data, in addition to their variant
calls (compact and summarized form of the raw data), mainly because of the immaturity of …
calls (compact and summarized form of the raw data), mainly because of the immaturity of …
[HTML][HTML] Efficient algorithms for secure outsourcing of bilinear pairings
The computation of bilinear pairings has been considered the most expensive operation in
pairing-based cryptographic protocols. In this paper, we first propose an efficient and secure …
pairing-based cryptographic protocols. In this paper, we first propose an efficient and secure …