Author of the publication

Reliable medical recommendation systems with patient privacy.

, , , and . ACM Trans. Intell. Syst. Technol., 4 (4): 67:1-67:31 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Index Structure for Private Data Outsourcing., and . DBSec, volume 6818 of Lecture Notes in Computer Science, page 247-254. Springer, (2011)Secure Computation on Floating Point Numbers., , , and . IACR Cryptology ePrint Archive, (2012)Phylotastic! Making tree-of-life knowledge accessible, reusable and convenient., , , , , , , , , and 18 other author(s). BMC Bioinform., (2013)Ontological Vulnerability Assessment.. WISE Workshops, volume 5176 of Lecture Notes in Computer Science, page 24-35. Springer, (2008)Data-oblivious graph algorithms for secure computation and outsourcing., , and . AsiaCCS, page 207-218. ACM, (2013)General secure sensor aggregation in the presence of malicious nodes., , and . ICDE, page 506-516. IEEE Computer Society, (2011)Reliable medical recommendation systems with patient privacy., , , and . ACM Trans. Intell. Syst. Technol., 4 (4): 67:1-67:31 (2013)Secure Computation on Floating Point Numbers., , , and . NDSS, The Internet Society, (2013)PICCO: a general-purpose compiler for private distributed computation., , and . ACM Conference on Computer and Communications Security, page 813-826. ACM, (2013)Widespread position-specific conservation of synonymous rare codons within coding sequences., , , , , , , , and . PLoS Comput. Biol., (2017)