Secure and private sequence comparisons, Proceeding of the ACM workshop on Privacy in the electronic society , WPES '03, 2003. ,
DOI : 10.1145/1005140.1005147
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.10.6669
Secure outsourcing of sequence comparisons, Workshop on Privacy Enhancing Technologies (PET), pp.63-78, 2004. ,
Secure outsourcing of sequence comparisons, International Journal of Information Security, vol.23, issue.4, pp.277-287, 2005. ,
DOI : 10.1007/s10207-005-0070-3
Secure Outsourcing of DNA Searching via Finite Automata, DBSec, pp.49-64, 2010. ,
DOI : 10.1007/978-3-642-13739-6_4
URL : https://hal.archives-ouvertes.fr/hal-01056669
Faster secure two-party computation using garbled circuits, USENIX Security Symposium, 2011. ,
Towards Practical Privacy for Genomic Computation, 2008 IEEE Symposium on Security and Privacy (sp 2008), pp.216-230, 2008. ,
DOI : 10.1109/SP.2008.34
Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima, CANS, pp.1-20, 2009. ,
DOI : 10.1007/978-3-642-10433-6_1
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.215.2387
Toward a practical data privacy scheme for a distributed implementation of the Smith-Waterman genome sequence comparison algorithm, Network and Distributed System Security Symposium (NDSS), 2006. ,
How to generate and exchange secrets, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986), pp.162-167, 1986. ,
DOI : 10.1109/SFCS.1986.25
Fully homomorphic encryption using ideal lattices, Proceedings of the 41st annual ACM symposium on Symposium on theory of computing, STOC '09, 2009. ,
DOI : 10.1145/1536414.1536440
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.362.7592
Secure and Efficient Outsourcing of Sequence Comparisons, ESORICS, pp.505-522, 2012. ,
DOI : 10.1007/978-3-642-33167-1_29
A Proof of Security of Yao???s Protocol for Two-Party Computation, Journal of Cryptology, vol.33, issue.4, pp.161-188, 2009. ,
DOI : 10.1007/s00145-008-9036-8
Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers, pp.465-482, 2010. ,
DOI : 10.1007/978-3-642-14623-7_25
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.164.1571
How to Delegate and Verify in Public: Verifiable Computation from Attribute-Based Encryption, TCC, pp.422-439, 2012. ,
DOI : 10.1007/978-3-642-28914-9_24
Secure and Verifiable Outsourcing of Large- Scale Biometric Computations, IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT), pp.1185-1191, 2011. ,
A Special Purpose Signature Scheme for Secure Computation of Traffic in a Distributed Network, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, pp.46-60, 2012. ,
A New Effcient Veriable Fuzzy Keyword Search Scheme, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, pp.61-71, 2012. ,