Academic literature on the topic 'Genomic data security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Genomic data security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Genomic data security"
Vavekanand, Raja. "Data Security and Privacy in Genomics Research: A Comparative Analysis to Protect Confidentiality." Studies in Medical and Health Sciences 1, no. 1 (2024): 23–31. http://dx.doi.org/10.48185/smhs.v1i1.1158.
Full textSmith, Marcus, and Ausma Bernot. "Government and Commercial Interests in Genomics: Improving Data Security and Regulation." Law, Technology and Humans 6, no. 1 (2024): 88–100. http://dx.doi.org/10.5204/lthj.3256.
Full textMohammed Yakubu, Abukari, and Yi-Ping Phoebe Chen. "Ensuring privacy and security of genomic data and functionalities." Briefings in Bioinformatics 21, no. 2 (2019): 511–26. http://dx.doi.org/10.1093/bib/bbz013.
Full textP., Shobha, and Nalini N. "Genomic Data Fusion using Paillier Cryptosystem." Journal of Current Science and Technology 14, no. 3 (2024): 57. http://dx.doi.org/10.59796/jcst.v14n3.2024.57.
Full textVillanueva, Angela G., Robert Cook-Deegan, Jill O. Robinson, Amy L. McGuire, and Mary A. Majumder. "Genomic Data-Sharing Practices." Journal of Law, Medicine & Ethics 47, no. 1 (2019): 31–40. http://dx.doi.org/10.1177/1073110519840482.
Full textProdduturi, Viswaketan Reddy. "GENOMIC DATA SECURITY AND PRIVACY IN HEALTHCARE INFORMATICS." INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND INFORMATION TECHNOLOGY 8, no. 1 (2025): 563–73. https://doi.org/10.34218/ijrcait_08_01_044.
Full textYeh, Kenneth, Jeanne Fair, Helen Cui, et al. "Achieving Health Security and Threat Reduction through Sharing Sequence Data." Tropical Medicine and Infectious Disease 4, no. 2 (2019): 78. http://dx.doi.org/10.3390/tropicalmed4020078.
Full textVenkata, Murali Krishna Neursu, Kilaru Kalyan, and Reddy Vatti Vineeth. "Genomic Data Engineering: AI-Enhanced Storage, Processing, and Analysis for Biotechnology Innovations." Global Journal of Engineering and Technology [GJET] 4, no. 2 (2025): 10–12. https://doi.org/10.5281/zenodo.14964119.
Full textAmmar, Alzaydi, Abedalrhman Kahtan, Nurhaliza Siti, and Ismail Mohd. "Enhancing Cyber Defense Mechanisms for Genomic Data in Personalized Healthcare Systems." Applied Science and Biotechnology Journal for Advanced Research 3, no. 5 (2024): 20–30. https://doi.org/10.5281/zenodo.13852606.
Full textGudodagi, Raveendra, and R. Venkata Siva Reddy. "Security Provisioning and Compression of Diverse Genomic Data based on Advanced Encryption Standard (AES) Algorithm." International Journal of Biology and Biomedical Engineering 15 (May 14, 2021): 104–12. http://dx.doi.org/10.46300/91011.2021.15.14.
Full textDissertations / Theses on the topic "Genomic data security"
Niyitegeka, David. "Composition de mécanismes cryptographiques et de tatouage pour la protection de données génétiques externalisées." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2020. http://www.theses.fr/2020IMTA0225.
Full textBook chapters on the topic "Genomic data security"
Humbert, Mathias, Erman Ayday, Jean-Pierre Hubaux, and Amalio Telenti. "On Non-cooperative Genomic Privacy." In Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-47854-7_24.
Full textAyday, Erman. "Cryptographic Solutions for Genomic Privacy." In Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2016. http://dx.doi.org/10.1007/978-3-662-53357-4_22.
Full textAyday, Erman, Jean Louis Raisaro, Urs Hengartner, Adam Molyneaux, and Jean-Pierre Hubaux. "Privacy-Preserving Processing of Raw Genomic Data." In Data Privacy Management and Autonomous Spontaneous Security. Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-54568-9_9.
Full textYamamoto, Akito, and Tetsuo Shibuya. "Privacy-Preserving Genomic Statistical Analysis Under Local Differential Privacy." In Data and Applications Security and Privacy XXXVII. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-37586-6_3.
Full textZhao, Chuan, Shengnan Zhao, Bo Zhang, Shan Jing, Zhenxiang Chen, and Minghao Zhao. "Towards Secure Computation of Similar Patient Query on Genomic Data Under Multiple Keys." In Cyberspace Safety and Security. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-37352-8_24.
Full textVasanth, R., and Dinesh Jackson Samuel. "Providing Data Security in Deep Learning by Using Genomic Procedure." In Advances in Intelligent Systems and Computing. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-0199-9_22.
Full textTeruya, Tadanori, Koji Nuida, Kana Shimizu, and Goichiro Hanaoka. "On Limitations and Alternatives of Privacy-Preserving Cryptographic Protocols for Genomic Data." In Advances in Information and Computer Security. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-22425-1_15.
Full textChen, Jing, Zhiping Chen, Linai Kuang, et al. "Security Count Query and Integrity Verification Based on Encrypted Genomic Data." In Proceedings of the 9th International Conference on Computer Engineering and Networks. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-3753-0_63.
Full textHabyarimana, Ephrem. "Future Vision, Summary and Outlook." In Big Data in Bioeconomy. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-71069-9_21.
Full textPálhalmi, János, and Anna Mező. "AI-Powered Microscopy Platform for Airborne Biothreat Detection." In Security Informatics and Law Enforcement. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-62083-6_10.
Full textConference papers on the topic "Genomic data security"
Naveed, Muhammad. "Hurdles for Genomic Data Usage Management." In 2014 IEEE Security and Privacy Workshops (SPW). IEEE, 2014. http://dx.doi.org/10.1109/spw.2014.44.
Full textGoodrich, Michael T. "The Mastermind Attack on Genomic Data." In 2009 30th IEEE Symposium on Security and Privacy (SP). IEEE, 2009. http://dx.doi.org/10.1109/sp.2009.4.
Full textOprisanu, Bristena, Georgi Ganev, and Emiliano De Cristofaro. "On Utility and Privacy in Synthetic Genomic Data." In Network and Distributed System Security Symposium. Internet Society, 2022. http://dx.doi.org/10.14722/ndss.2022.24092.
Full textHuang, Zhicong, Erman Ayday, Jacques Fellay, Jean-Pierre Hubaux, and Ari Juels. "GenoGuard: Protecting Genomic Data against Brute-Force Attacks." In 2015 IEEE Symposium on Security and Privacy (SP). IEEE, 2015. http://dx.doi.org/10.1109/sp.2015.34.
Full textCheng, Ke, Yantian Hou, and Liangmin Wang. "Secure Similar Sequence Query on Outsourced Genomic Data." In ASIA CCS '18: ACM Asia Conference on Computer and Communications Security. ACM, 2018. http://dx.doi.org/10.1145/3196494.3196535.
Full textMigliore, Andrea, Stelvio Cimato, and Gabriella Trucco. "Efficient Secure Computation of Edit Distance on Genomic Data." In 10th International Conference on Information Systems Security and Privacy. SCITEPRESS - Science and Technology Publications, 2024. http://dx.doi.org/10.5220/0012459400003648.
Full textYilmaz, Emre, Tianxi Ji, Erman Ayday, and Pan Li. "Genomic Data Sharing under Dependent Local Differential Privacy." In CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy. ACM, 2022. http://dx.doi.org/10.1145/3508398.3511519.
Full textSimmons, Sean, and Bonnie Berger. "One Size Doesn't Fit All: Measuring Individual Privacy in Aggregate Genomic Data." In 2015 IEEE Security and Privacy Workshops (SPW). IEEE, 2015. http://dx.doi.org/10.1109/spw.2015.25.
Full textKi, Youngjoon, and Ji Won Yoon. "An Efficient Method for Securely Storing and Handling of Genomic Data." In 2017 International Conference on Software Security and Assurance (ICSSA). IEEE, 2017. http://dx.doi.org/10.1109/icssa.2017.13.
Full textTurkmen, Fatih, Muhammad Rizwan Asghar, and Yuri Demchenko. "iGenoPri: Privacy-preserving genomic data processing with integrity and correctness proofs." In 2016 14th Annual Conference on Privacy, Security and Trust (PST). IEEE, 2016. http://dx.doi.org/10.1109/pst.2016.7906964.
Full textReports on the topic "Genomic data security"
Verzi, Stephen, Raga Krishnakumar, Drew Levin, Daniel Krofcheck, and Kelly Williams. Data Science and Machine Learning for Genome Security. Office of Scientific and Technical Information (OSTI), 2021. http://dx.doi.org/10.2172/1855003.
Full textFromm, Hillel, Paul Michael Hasegawa, and Aaron Fait. Calcium-regulated Transcription Factors Mediating Carbon Metabolism in Response to Drought. United States Department of Agriculture, 2013. http://dx.doi.org/10.32747/2013.7699847.bard.
Full textLers, Amnon, Majid R. Foolad, and Haya Friedman. genetic basis for postharvest chilling tolerance in tomato fruit. United States Department of Agriculture, 2014. http://dx.doi.org/10.32747/2014.7600014.bard.
Full text