R. Bjones, Architecture serving complex Identity Infrastructures, Trust in Digital Life, pp.21-2012

J. Camenisch, I. Krontiris, A. Lehmann, G. Neven, C. Paquin et al., Architecture for Attribute-based Credential Technologies, pp.107-128

E. Rissanen, eXtensible Access Control Markup Language (XACML) Version 3.0, OASIS standard, 2010.

Z. Ibm-research, Specification of the Identity Mixer Cryptographic Library Version 2.3, p.2010

C. Fontaine and F. Galand, A Survey of Homomorphic Encryption for Nonspecialists, EURASIP Journal on Information Security, 2007.
URL : https://hal.archives-ouvertes.fr/inria-00504233

I. Damgård, V. Pastro, N. Smart, and S. Zakarias, Multiparty Computation from Somewhat Homomorphic Encryption Advances in Cryptology -CRYPTO 2012, LNCS, vol.7417, pp.643-662, 2012.

M. Finiasz and N. Sendrier, Security Bounds for the Design of Code-Based Cryptosystems Adv, Cryptology -ASIACRYPT 2009, pp.88-105, 2009.

F. M. Willems, Y. M. Shtarkov, and T. J. Tjalkens, The context-tree weighting method: basic properties, IEEE Transactions on Information Theory, vol.41, issue.3, pp.653-664, 1995.
DOI : 10.1109/18.382012

T. Matsumoto, K. Sadakane, and H. Imai, Biological Sequence Compression Algorithms, Genome Informatics Workshop, vol.11, pp.43-52, 2000.

J. R. Troncoso-pastoriza, S. Katzenbeisser, and M. Celik, Privacy preserving error resilient dna searching through oblivious automata, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.519-528, 2007.
DOI : 10.1145/1315245.1315309

S. Jha, L. Kruger, and V. Shmatikov, Towards Practical Privacy for Genomic Computation, 2008 IEEE Symposium on Security and Privacy (sp 2008), pp.216-230, 2008.
DOI : 10.1109/SP.2008.34

F. Bruekers, S. Katzenbeisser, K. Kursawe, and P. Tuyls, Privacy-Preserving Matching of DNA Profiles, IACR Cryptology ePrint Archive, 2008.

D. Eppstein, M. T. Goodrich, and P. Baldi, Privacy-Enhanced Methods for Comparing Compressed DNA Sequences, 2011.

C. Adami, Information theory in molecular biology, Physics of Life Reviews, vol.1, issue.1, pp.3-22, 2004.
DOI : 10.1016/j.plrev.2004.01.002

R. Cilibrasi and P. Vitanyi, Clustering by Compression, IEEE Transactions on Information Theory, vol.51, issue.4, pp.1523-1545, 2005.
DOI : 10.1109/TIT.2005.844059

E. De-cristofaro, S. Faber, P. Gasti, and G. Tsudik, Genodroid, Proceedings of the 2012 ACM workshop on Privacy in the electronic society, WPES '12, pp.97-108, 2012.
DOI : 10.1145/2381966.2381980

F. M. Willems, A. Nowbahkt-irani, and P. A. Volf, Maximum a-Posteriori Tree Models, 2002.