Skip to main content
. 2018 Oct 11;11(Suppl 4):82. doi: 10.1186/s12920-018-0399-x

Fig. 2.

Fig. 2

Use-case for multi-party search over encrypted genomic data