Architecture serving complex Identity Infrastructures, Trust in Digital Life, pp.21-2012 ,
Architecture for Attribute-based Credential Technologies, pp.107-128 ,
eXtensible Access Control Markup Language (XACML) Version 3.0, OASIS standard, 2010. ,
Specification of the Identity Mixer Cryptographic Library Version 2.3, p.2010 ,
A Survey of Homomorphic Encryption for Nonspecialists, EURASIP Journal on Information Security, 2007. ,
URL : https://hal.archives-ouvertes.fr/inria-00504233
Multiparty Computation from Somewhat Homomorphic Encryption Advances in Cryptology -CRYPTO 2012, LNCS, vol.7417, pp.643-662, 2012. ,
Security Bounds for the Design of Code-Based Cryptosystems Adv, Cryptology -ASIACRYPT 2009, pp.88-105, 2009. ,
The context-tree weighting method: basic properties, IEEE Transactions on Information Theory, vol.41, issue.3, pp.653-664, 1995. ,
DOI : 10.1109/18.382012
Biological Sequence Compression Algorithms, Genome Informatics Workshop, vol.11, pp.43-52, 2000. ,
Privacy preserving error resilient dna searching through oblivious automata, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.519-528, 2007. ,
DOI : 10.1145/1315245.1315309
Towards Practical Privacy for Genomic Computation, 2008 IEEE Symposium on Security and Privacy (sp 2008), pp.216-230, 2008. ,
DOI : 10.1109/SP.2008.34
Privacy-Preserving Matching of DNA Profiles, IACR Cryptology ePrint Archive, 2008. ,
Privacy-Enhanced Methods for Comparing Compressed DNA Sequences, 2011. ,
Information theory in molecular biology, Physics of Life Reviews, vol.1, issue.1, pp.3-22, 2004. ,
DOI : 10.1016/j.plrev.2004.01.002
Clustering by Compression, IEEE Transactions on Information Theory, vol.51, issue.4, pp.1523-1545, 2005. ,
DOI : 10.1109/TIT.2005.844059
Genodroid, Proceedings of the 2012 ACM workshop on Privacy in the electronic society, WPES '12, pp.97-108, 2012. ,
DOI : 10.1145/2381966.2381980
Maximum a-Posteriori Tree Models, 2002. ,