scispace - formally typeset
M

Momin Al Aziz

Researcher at University of Manitoba

Publications -  24
Citations -  370

Momin Al Aziz is an academic researcher from University of Manitoba. The author has contributed to research in topics: Encryption & Homomorphic encryption. The author has an hindex of 8, co-authored 22 publications receiving 213 citations. Previous affiliations of Momin Al Aziz include University of California, San Diego & Bangladesh University.

Papers
More filters
Journal ArticleDOI

SAFETY: Secure gwAs in Federated Environment through a hYbrid Solution

TL;DR: SAFETY is a hybrid framework, which can securely perform genome-wide association studies on federated genomic datasets using homomorphic encryption and recently introduced secure hardware component of Intel Software Guard Extensions to ensure high efficiency and privacy at the same time.
Journal ArticleDOI

Privacy-preserving techniques of genomic data-a survey.

TL;DR: The different privacy and security-related problems revolving around human genomic data are discussed, and some of the cardinal cryptographic concepts, which can bring efficacy in secure and private genomic data computation are explored.
Journal ArticleDOI

PRESAGE: PRivacy-preserving gEnetic testing via SoftwAre Guard Extension

TL;DR: The proposed PRESAGE framework provides an alternative solution for secure and efficient genomic data outsourcing in an untrusted cloud by using a hybrid framework that combines secure hardware and multiple crypto protocols.
Journal ArticleDOI

Secure approximation of edit distance on genomic data.

TL;DR: This paper proposes two different approximation methods to securely compute the edit distance among genomic sequences and uses shingling, private set intersection methods, the banded alignment algorithm, and garbled circuits to implement these methods.
Journal ArticleDOI

Aftermath of bustamante attack on genomic beacon service

TL;DR: Two lightweight algorithms (based on randomized response) which captures the efficacy while preserving the privacy of the participants in a genomic beacon service are proposed which will make the attack much difficult to succeed while maintaining the fundamental motivation of beacon database network.