Aftermath of bustamante attack on genomic beacon service

The authors ‘propose two lightweight algorithms (based on randomized response) which captures the efficacy while preserving the privacy of the participants in a genomic beacon service. [They] also elaborate the strength and weakness of the attack by explaining some of their statistical and mathematical models using real world genomic database.’

  • Al Aziz MM, Ghasemi R, Waliullah M, Mohammed N
    Aftermath of bustamante attack on genomic beacon service
    BMC Medical Genomics 2017 10(Suppl 2):43
    (Abstract, PDF, Source Code)