{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T02:08:07Z","timestamp":1729649287863,"version":"3.28.0"},"reference-count":52,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1109\/sp.2017.21","type":"proceedings-article","created":{"date-parts":[[2017,6,26]],"date-time":"2017-06-26T16:34:26Z","timestamp":1498494866000},"page":"957-976","source":"Crossref","is-referenced-by-count":24,"title":["Identifying Personal DNA Methylation Profiles by Genotype Inference"],"prefix":"10.1109","author":[{"given":"Michael","family":"Backes","sequence":"first","affiliation":[]},{"given":"Pascal","family":"Berrang","sequence":"additional","affiliation":[]},{"given":"Matthias","family":"Bieg","sequence":"additional","affiliation":[]},{"given":"Roland","family":"Eils","sequence":"additional","affiliation":[]},{"given":"Carl","family":"Herrmann","sequence":"additional","affiliation":[]},{"given":"Mathias","family":"Humbert","sequence":"additional","affiliation":[]},{"given":"Irina","family":"Lehmann","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"HElib An Implementation of Homomorphic Encryption","year":"2014","author":"halevi","key":"ref39"},{"key":"ref38","article-title":"Fully homomorphic encryption without bootstrapping","author":"brakerski","year":"2011","journal-title":"Cryptology ePrint Archive"},{"key":"ref33","volume":"1","author":"friedman","year":"2001","journal-title":"The Elements of Statistical Learning"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"278","DOI":"10.1109\/ICDAR.1995.598994","article-title":"Random decision forests","volume":"1","author":"ho","year":"1995","journal-title":"Document Analysis and Recognition 1995 Proceedings of the Third International Conference on"},{"journal-title":"Igsr The international genome sample resource","year":"0","key":"ref31"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1111\/j.2517-6161.1995.tb02031.x","article-title":"Controlling the false discovery rate: a practical and powerful approach to multiple testing","author":"benjamini","year":"1995","journal-title":"Journal of the Royal Statistical Society Series B (Methodological)"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"ref36","article-title":"Probabilistic encryption and how to play mental poker keeping secret all private information","author":"goldwasser","year":"1982","journal-title":"Proc 14th ACM Symp on Theory of Computing"},{"journal-title":"Sophia Genetics","year":"0","key":"ref35"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1186\/s13148-015-0103-3"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1186\/gb-2012-13-7-r61"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.4153\/CJM-1965-045-4"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.2307\/1412159"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1038\/nrg3723"},{"journal-title":"President obama's precision medicine initiative","year":"0","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1186\/s13059-016-0926-z"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2015-0020"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1126\/science.1229566"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2517840.2517843"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23241"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2665943.2665952"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1038\/gim.2015.167"},{"key":"ref50","first-page":"17","article-title":"Privacy in pharmacogenetics: An end-to-end case study of personalized warfarin dosing","author":"fredrikson","year":"2014","journal-title":"Proceedings of the 23rd USENIX Security Symposium"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/s001459910006"},{"key":"ref52","first-page":"197","article-title":"Secure multiparty computation for privacy-preserving data mining","volume":"2008","author":"lindell","year":"2008","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1186\/s13059-015-0842-7"},{"journal-title":"openSNP","year":"0","key":"ref11"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511721656"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1038\/nrg3230"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1038\/nature14192"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1101\/gad.230318.113"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.15252\/msb.20156520"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1038\/srep28616"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1038\/ncomms11115"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.4161\/15592294.2014.969637"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1101\/gr.171439.113"},{"journal-title":"The growth of the gene expression omnibus","year":"0","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516707"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1200\/JCO.2004.07.151"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1002\/path.1024"},{"key":"ref8","first-page":"1","article-title":"The ghost in our genes: legal and ethical implications of epigenetics","volume":"19","author":"rothstein","year":"2009","journal-title":"Health matrix (Cleveland Ohio 1991)"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1126\/science.1235122"},{"key":"ref49","article-title":"Privacy-preserving computation of disease risk by using genomic, clinical, and environmental data","author":"ayday","year":"2013","journal-title":"Presented As Part of the 2013 USENIX Workshop on Health Information Technologies"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1186\/s13059-015-0723-0"},{"key":"ref46","article-title":"Privacy in epigenetics: Temporal linkability of MicroRNA expression profiles","author":"backes","year":"2016","journal-title":"25th USENIX Security Symposium"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1423854112"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2015.14"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978355"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1186\/s12859-016-1144-0"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-012-9720-4"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1038\/ng.2248"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1186\/1868-7083-6-28"}],"event":{"name":"2017 IEEE Symposium on Security and Privacy (SP)","start":{"date-parts":[[2017,5,22]]},"location":"San Jose, CA, USA","end":{"date-parts":[[2017,5,26]]}},"container-title":["2017 IEEE Symposium on Security and Privacy (SP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7957740\/7958557\/07958619.pdf?arnumber=7958619","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,26]],"date-time":"2019-09-26T23:45:46Z","timestamp":1569541546000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7958619\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":52,"URL":"https:\/\/doi.org\/10.1109\/sp.2017.21","relation":{},"subject":[],"published":{"date-parts":[[2017,5]]}}}