Hundreds of variants clustered in genomic loci and biological pathways affect human height, Nature, issue.7317, pp.467832-838, 2010. ,
URL : https://hal.archives-ouvertes.fr/cea-00904990
Geo-indistinguishability, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13 ,
DOI : 10.1145/2508859.2516735
The Chills and Thrills of Whole Genome Sequencing, Computer, 2015. ,
DOI : 10.1109/MC.2013.333
Privacy-Preserving Processing of Raw Genomic Data, DPM'13: Proc. of the 8th Int'l Workshop on Data Privacy Management, pp.133-147, 2013. ,
DOI : 10.1007/978-3-642-54568-9_9
Protecting and evaluating genomic privacy in medical tests and personalized medicine, Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society, WPES '13, pp.95-106, 2013. ,
DOI : 10.1145/2517840.2517843
Countering GATTACA, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, pp.691-702, 2011. ,
DOI : 10.1145/2046707.2046785
Toward DNA-based facial composites: Preliminary results and validation, Forensic Science International: Genetics, vol.13, pp.208-216, 2014. ,
DOI : 10.1016/j.fsigen.2014.08.008
Modeling 3D Facial Shape from DNA, PLoS Genetics, vol.46, issue.3, p.1004224, 2014. ,
DOI : 10.1371/journal.pgen.1004224.s049
On inferring presence of an individual in a mixture: a Bayesian approach, Biostatistics, vol.11, issue.4, pp.661-673, 2010. ,
DOI : 10.1093/biostatistics/kxq035
Routes for breaching and protecting genetic privacy, Nature Reviews Genetics, vol.15, issue.6, pp.409-421, 2014. ,
DOI : 10.1101/000042
Efficient algorithms for finding maximum matching in graphs, ACM Computing Surveys, vol.18, issue.1, pp.23-38, 1986. ,
DOI : 10.1145/6462.6502
Inferential Genotyping of Y Chromosomes in Latter-Day Saints Founders and Comparison to Utah Samples in the HapMap Project, The American Journal of Human Genetics, vol.84, issue.2, pp.251-258, 2009. ,
DOI : 10.1016/j.ajhg.2009.01.018
openSNP???A Crowdsourced Web Resource for Personal Genomics, PLoS ONE, vol.29, issue.3, p.89204, 2014. ,
DOI : 10.1371/journal.pone.0089204.t001
Identifying Personal Genomes by Surname Inference, Science, vol.339, issue.6117, pp.321-324, 2013. ,
DOI : 10.1126/science.1229566
Identifying Personal Genomes by Surname Inference, Science, vol.339, issue.6117, pp.321-324, 2013. ,
DOI : 10.1126/science.1229566
Privacy protections: The genome hacker, Nature, vol.497, issue.7448, pp.172-174, 2013. ,
DOI : 10.1038/497172a
Resolving Individuals Contributing Trace Amounts of DNA to Highly Complex Mixtures Using High-Density SNP Genotyping Microarrays, PLoS Genetics, vol.42, issue.8, 2008. ,
DOI : 10.1371/journal.pgen.1000167.t001
Addressing the concerns of the lacks family, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, pp.1141-1152, 2013. ,
DOI : 10.1145/2508859.2516707
On Sharing Quantitative Trait GWAS Results in an Era of Multiple-omics Data and the Limits of Genomic Privacy, The American Journal of Human Genetics, vol.90, issue.4, pp.591-598, 2012. ,
DOI : 10.1016/j.ajhg.2012.02.008
Privacy-preserving data exploration in genome-wide association studies, Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '13, pp.1079-1087, 2013. ,
DOI : 10.1145/2487575.2487687
A Cryptographic Approach to Securely Share and Query Genomic Sequences, IEEE Transactions on Information Technology in Biomedicine, vol.12, issue.5, pp.606-617, 2008. ,
DOI : 10.1109/TITB.2007.908465
Improving human forensics through advances in genetics, genomics and molecular biology, Nature Reviews Genetics, vol.19, issue.3, pp.179-192, 2011. ,
DOI : 10.1038/nrg2952
GENETICS: Genomic Research and Human Subject Privacy, Science, vol.305, issue.5681, p.305183, 2004. ,
DOI : 10.1126/science.1095019
A Genome-Wide Association Study Identifies Five Loci Influencing Facial Morphology in Europeans, PLoS Genetics, vol.8, issue.9, p.1002932, 2012. ,
DOI : 10.1371/journal.pgen.1002932.s007
How (not) to protect genomic data privacy in a distributed network: using trail re-identification to evaluate and design anonymity protection systems, Journal of Biomedical Informatics, vol.37, issue.3, pp.179-192, 2004. ,
DOI : 10.1016/j.jbi.2004.04.005
A genome-wide approach accounting for body mass index identifies genetic variants influencing fasting glycemic traits and insulin resistance, Nature Genetics, vol.129, issue.6, pp.44659-669, 2012. ,
DOI : 10.1038/ng1696
Robust De-anonymization of Large Sparse Datasets, 2008 IEEE Symposium on Security and Privacy (sp 2008), pp.111-125, 2008. ,
DOI : 10.1109/SP.2008.33
De-anonymizing Social Networks, 2009 30th IEEE Symposium on Security and Privacy, pp.173-187, 2009. ,
DOI : 10.1109/SP.2009.22
URL : http://arxiv.org/abs/0903.3276
Predicting Human Age with Bloodstains by sjTREC Quantification, PLoS ONE, vol.7, issue.8, p.42412, 2012. ,
DOI : 10.1371/journal.pone.0042412.t003
Building a face, and a case, on DNA, 2015. ,
Quantifying location privacy, SP'11: Proc. of the 32nd IEEE Symp. on Security and Privacy, pp.247-262, 2011. ,
URL : https://hal.archives-ouvertes.fr/hal-01266229
Deanonymizing mobility traces, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, pp.628-637, 2012. ,
DOI : 10.1145/2382196.2382262
Identifying Participants in the Personal Genome Project by Name, SSRN Electronic Journal, vol.24, 2013. ,
DOI : 10.2139/ssrn.2257732
Perfect Matching Disclosure Attacks, PETS'08: Proc. of the 8th Privacy Enhancing Technologies Symp, pp.2-23, 2008. ,
DOI : 10.1007/978-3-540-70630-4_2
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.147.4953
Privacypreserving data sharing for genome-wide association studieswith-genetic- testing-i-gave-my-parents-the-gift-of-divorce-23andme, Journal of Privacy and Confidentiality, vol.537995975653, issue.1, 2013. ,
IrisPlex: A sensitive DNA tool for accurate prediction of blue and brown eye colour in the absence of ancestry information, Forensic Science International: Genetics, vol.5, issue.3, pp.170-180, 2011. ,
DOI : 10.1016/j.fsigen.2010.02.004
Learning your identity and disease from research papers, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pp.534-544, 2009. ,
DOI : 10.1145/1653662.1653726
To Release or Not to Release: Evaluating Information Leaks in Aggregate Human-Genome Data, ESORICS'11: Proc. of the 16th European Conf. on Research in Computer Security, pp.607-627, 2011. ,
DOI : 10.1007/978-3-642-23822-2_33
Estimating human age from T-cell DNA rearrangements, Current Biology, vol.20, issue.22, pp.20-970, 2010. ,
DOI : 10.1016/j.cub.2010.10.022