-
1
-
-
0033790614
-
Managing medical and insurance information through a smait-card-based information system
-
C. Lambrinoudakis and S. Gritzalis, "Managing medical and insurance information through a smait-card-based information system," J. Med. Syst., vol. 24, no. 4, pp. 213-234, 2000.
-
(2000)
J. Med. Syst.
, vol.24
, Issue.4
, pp. 213-234
-
-
Lambrinoudakis, C.1
Gritzalis, S.2
-
3
-
-
0038675463
-
Integrating smart card access to web-based medical information system
-
T. S. Chan, "Integrating smart card access to web-based medical information system," in Proc. ACM Symp. Applied Computing, 2003, pp. 246-250.
-
(2003)
Proc. ACM Symp. Applied Computing
, pp. 246-250
-
-
Chan, T.S.1
-
6
-
-
0001798914
-
Ignorance undercuts gene tests' potential
-
R. Weiss, "Ignorance undercuts gene tests' potential," The Washington Post, p. A1, 2000.
-
(2000)
The Washington Post
-
-
Weiss, R.1
-
7
-
-
84862347064
-
-
[Online]
-
National Standards to Protect the Privacy of Personal Health Information, Office for Civil Rights. (2001). [Online]. Available: http://www.hhs.gov/ocr/ hipaa/
-
(2001)
-
-
-
10
-
-
84862347067
-
-
[Online]
-
Standards for Privacy of Individually Identifiable Health Information, Office for Civil Rights. (2001). [Online]. Available: http://www.hhs.gov/ocr/ hipaa/finalmaster.html
-
(2001)
-
-
-
11
-
-
0005612033
-
-
[Online]
-
Health Care Financing Administration. (2001) Study of Pharmaceutical Benefit Management. [Online]. Available: http://www.hcfa.gov/research/pharmbm. pdf
-
(2001)
Study of Pharmaceutical Benefit Management
-
-
-
13
-
-
1842504738
-
-
Sacramento, CA
-
California Board of Pharmacy, California Pharmacy Laws Sacramento, CA.
-
California Pharmacy Laws
-
-
-
15
-
-
84921018856
-
A practical and provably secure colalition-resistant group signature scheme, advances in cryptology
-
Proc. CRYPTO'00. Berlin, Germany: Springer-Verlag
-
G. Ateniese, J. Camenisch, M. Joye, and G. Tsudik, "A practical and provably secure colalition-resistant group signature scheme, advances in cryptology," in Proc. CRYPTO'00 (Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag, 2000, vol. 1880, pp. 255-270.
-
(2000)
Lecture Notes in Computer Science
, vol.1880
, pp. 255-270
-
-
Ateniese, G.1
Camenisch, J.2
Joye, M.3
Tsudik, G.4
-
16
-
-
1842556999
-
Protecting doctor's identity in drug prescription analysis
-
V. Maruaa Jr, "Protecting doctor's identity in drug prescription analysis," Health Informatics J., vol. 4, p. 4, 1998.
-
(1998)
Health Informatics J.
, vol.4
, pp. 4
-
-
Maruaa Jr., V.1
-
18
-
-
1642614187
-
Strong proxy signature and its applications
-
B. Lee, H. Kim, and K. Kim, "Strong proxy signature and its applications," in Proc. SCIS, 2001, pp. 603-608.
-
(2001)
Proc. SCIS
, pp. 603-608
-
-
Lee, B.1
Kim, H.2
Kim, K.3
-
21
-
-
0010567510
-
Proxy signatures, revisited
-
Proc. Int. Conf. Information and Communication Security. Berlin, Germany: Springer-Verlag
-
S. Kim, S. Park, and D. Won, "Proxy signatures, revisited," in Proc. Int. Conf. Information and Communication Security (Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag, 1997, vol. 1334, pp. 223-232.
-
(1997)
Lecture Notes in Computer Science
, vol.1334
, pp. 223-232
-
-
Kim, S.1
Park, S.2
Won, D.3
-
23
-
-
0000064722
-
Threshold proxy signature schemes
-
Japan
-
K. Zhang, "Threshold proxy signature schemes," in Proc. Information Security Workshop. Japan, 1997, pp. 191-197.
-
(1997)
Proc. Information Security Workshop
, pp. 191-197
-
-
Zhang, K.1
-
24
-
-
84956860632
-
On Zhang' s nonrepudiable proxy signature schemes
-
N. Y. Lee, T. Hwang, and C. H. Wang, "On Zhang' s nonrepudiable proxy signature schemes," in Proc. 3rd Australasian Conf. Information Security and Privacy, 1998, pp. 415-422.
-
(1998)
Proc. 3rd Australasian Conf. Information Security and Privacy
, pp. 415-422
-
-
Lee, N.Y.1
Hwang, T.2
Wang, C.H.3
-
25
-
-
0000537828
-
Efficient identification and signature for smart cards
-
Advances in Cryptology, CRYPTO'89. Berlin, Germany: Springer-Verlag
-
C. Schnorr, "Efficient identification and signature for smart cards," in Advances in Cryptology, CRYPTO'89 (Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag, 1989, vol. 435, pp. 235-251.
-
(1989)
Lecture Notes in Computer Science
, vol.435
, pp. 235-251
-
-
Schnorr, C.1
-
26
-
-
0026156775
-
An analysis of the proxy problem in distributed systems
-
V. Varadharajan, P. Allen, and S. Black, "An analysis of the proxy problem in distributed systems," in Proc. IEEE Symp. Research in Security and Privacy, 1991, pp. 255-275.
-
(1991)
Proc. IEEE Symp. Research in Security and Privacy
, pp. 255-275
-
-
Varadharajan, V.1
Allen, P.2
Black, S.3
-
28
-
-
84958751721
-
Secure mobile agent using strong non-designated proxy signature
-
Proc. ACISP. Berlin, Germany: Springer-Verlag
-
B. Lee, H. Kim, and K. Kim, "Secure mobile agent using strong non-designated proxy signature," in Proc. ACISP (Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag, 2001, vol. 2119, pp. 474-486.
-
(2001)
Lecture Notes in Computer Science
, vol.2119
, pp. 474-486
-
-
Lee, B.1
Kim, H.2
Kim, K.3
-
29
-
-
67651053584
-
Pseudonym systems
-
Selected Areas in Cryptography. Berlin, Germany: Springer-Verlag
-
A. Lysyanskaya, R. Rivest, A. Sahai, and S. Wolf, "Pseudonym systems," in Selected Areas in Cryptography (Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag, 1999, vol. 1758.
-
(1999)
Lecture Notes in Computer Science
, vol.1758
-
-
Lysyanskaya, A.1
Rivest, R.2
Sahai, A.3
Wolf, S.4
-
30
-
-
84948962858
-
Blind signatures based on the discrete logarithm problem
-
LNCS
-
J. Camenisch, J. M. Piveteau, and M. Stadler, "Blind signatures based on the discrete logarithm problem," in Advances in Cryptology, EURO-CRYPT '94, vol. 950, LNCS, 1994, pp. 428-432.
-
(1994)
Advances in Cryptology, EURO-CRYPT '94
, vol.950
, pp. 428-432
-
-
Camenisch, J.1
Piveteau, J.M.2
Stadler, M.3
-
31
-
-
84955579666
-
Provably secure blind signature schemes
-
Advances in Cryptology, ASIACRYPT'96. Berlin, Germany: Springer-Verlag
-
D. Pointcheval and J. Stern, "Provably secure blind signature schemes," in Advances in Cryptology, ASIACRYPT'96 (Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag, 1996, vol. 1163, pp. 252-265.
-
(1996)
Lecture Notes in Computer Science
, vol.1163
, pp. 252-265
-
-
Pointcheval, D.1
Stern, J.2
-
32
-
-
51449100652
-
On the Protection of Medical Data
-
Council of Europe, "On the Protection of Medical Data," Recommendation R(75), 1997.
-
(1997)
Recommendation R(75)
-
-
-
33
-
-
84862347069
-
-
[Online]
-
Council of Europe. [Online]. Available: http://www.healthsmartcard.net/
-
-
-
-
34
-
-
0031047011
-
Smart cardsCthe key to trustworthy health information systems
-
R. Neame, "Smart cardsCthe key to trustworthy health information systems," BMJ, vol. 314, pp. 573-577, 1997.
-
(1997)
BMJ
, vol.314
, pp. 573-577
-
-
Neame, R.1
-
35
-
-
84862347070
-
-
[Online]
-
Council of Europe. [Online]. Available: http://www.gprd.com
-
-
-
-
36
-
-
84887636287
-
Security infrastructure of an oncological network using health professional cards
-
Amsterdam, The Netherlands: IOS Press
-
B. Blobel and P. Pharow, "Security infrastructure of an oncological network using health professional cards," in Health Cards '97 (Series in Health Technology and Informatics). Amsterdam, The Netherlands: IOS Press, 1997, vol. 49, pp. 323-334.
-
(1997)
Health Cards '97 (Series in Health Technology and Informatics)
, vol.49
, pp. 323-334
-
-
Blobel, B.1
Pharow, P.2
-
41
-
-
1842452328
-
Security Issues in Health Care
-
Y. J. Yang, "Security Issues in Health Care,", Term Rep., 2003.
-
(2003)
Term Rep.
-
-
Yang, Y.J.1
-
48
-
-
84862347063
-
-
[Online]
-
[Online]. Available: http://www.infineon.com/
-
-
-
-
49
-
-
84862345785
-
-
[Online]
-
[Online]. Available: http://www.atmel.com/
-
-
-
-
50
-
-
0038562448
-
Privacy oriented clearing for the german health care system
-
I. R. Anderson, Ed. New York: Springer-Verlag
-
G. Bleumer and M. Schunter, "Privacy oriented clearing for the german health care system," in Personal Information Security, Engineering and Ethics, I. R. Anderson, Ed. New York: Springer-Verlag, 1997, pp. 175-194.
-
(1997)
Personal Information Security, Engineering and Ethics
, pp. 175-194
-
-
Bleumer, G.1
Schunter, M.2
|