An iterative algorithm for trust management and adversary detection for delay-tolerant networks Read more about An iterative algorithm for trust management and adversary detection for delay-tolerant networks
A secure broadcasting scheme to provide availability, reliability and authentication for wireless sensor networks Read more about A secure broadcasting scheme to provide availability, reliability and authentication for wireless sensor networks
A recommender system based on belief propagation over pairwise Markov random fields Read more about A recommender system based on belief propagation over pairwise Markov random fields
Whole Genome Sequencing: Innovation Dream or Privacy Nightmare? Read more about Whole Genome Sequencing: Innovation Dream or Privacy Nightmare?
Towards privacy compliance in the management of raw genomic data Read more about Towards privacy compliance in the management of raw genomic data
The chills and thrills of whole genome sequencing Read more about The chills and thrills of whole genome sequencing
Secure device authentication mechanisms for the smart grid-enabled home area networks Read more about Secure device authentication mechanisms for the smart grid-enabled home area networks
Protecting and evaluating genomic privacy in medical tests and personalized medicine Read more about Protecting and evaluating genomic privacy in medical tests and personalized medicine
Privacy-Preserving Computation of Disease Risk by Using Genomic, Clinical, and Environmental Data (poster version) Read more about Privacy-Preserving Computation of Disease Risk by Using Genomic, Clinical, and Environmental Data (poster version)
Privacy-preserving computation of disease risk by using genomic, clinical, and environmental data Read more about Privacy-preserving computation of disease risk by using genomic, clinical, and environmental data