메뉴 건너뛰기




Volumn 126, Issue , 2007, Pages 239-247

Multi-centric universal pseudonymisation for secondary use of the EHR

Author keywords

HealthGrid; Multi centric Studies; Privacy; Pseudonymisation

Indexed keywords

CLINICAL RESEARCH; DATA PRIVACY; HOSPITAL DATA PROCESSING; PATIENT TREATMENT;

EID: 34548557737     PISSN: 09269630     EISSN: 18798365     Source Type: Book Series    
DOI: None     Document Type: Conference Paper
Times cited : (22)

References (10)
  • 1
    • 71749089189 scopus 로고    scopus 로고
    • Integrating Data Custodians in eHealth Grids-A Digest of Security and Privacy Aspects
    • Informatik 2006-Informatik für Menschen, Lecture Notes in Informatics (LNI)
    • J. Fingberg, M. Hansen, M. Hansen, H. Krasemann, L. Lo Iacono, T. Probst, and J. Wright: Integrating Data Custodians in eHealth Grids-A Digest of Security and Privacy Aspects, In: Christian Hochberger, and Rüdiger Liskowsky (Eds. ), Informatik 2006-Informatik für Menschen, Lecture Notes in Informatics (LNI) vol. P-93, pp. 695-701, 2006.
    • (2006) Christian Hochberger and Rüdiger Liskowsky , vol.P93 , pp. 695-701
    • Fingberg, J.1    Hansen, M.2    Hansen, M.3    Krasemann, H.4    Lo Iacono, L.5    Probst, T.6    Wright, J.7
  • 2
    • 77955516185 scopus 로고    scopus 로고
    • Keyed hash functions
    • E. Dawson and Jovan Golic (Eds. ), Cryptography: Policy and Algorithms Springer-Verlag
    • S. Bakhtiari, R. Safavi-Naini, and J. Pieprzyk: Keyed hash functions, In: E. Dawson, and Jovan Golic (Eds. ), Cryptography: Policy and Algorithms, Lecture Notes in Computer Science, vol. 1029, pp. 201-214, Springer-Verlag, 1996.
    • (1996) Lecture Notes in Computer Science , vol.1029 , pp. 201-214
    • Bakhtiari, S.1    Safavi-Naini, R.2    Pieprzyk, J.3
  • 3
    • 15544389962 scopus 로고    scopus 로고
    • Secondary use of the EHR via pseudonymisation
    • In: L. Bos, S. Laxminarayan, A. Marsh (Eds. ) IOS Press, Amsterdam
    • K. Pommerening, and M. Reng: Secondary use of the EHR via pseudonymisation, In: L. Bos, S. Laxminarayan, A. Marsh (Eds. ), Medical Care Compunetics 1, pp. 441-446, IOS Press, Amsterdam 2004.
    • (2004) Medical Care Compunetics , vol.1 , pp. 441-446
    • Pommerening, K.1    Reng, M.2
  • 7
    • 84874800178 scopus 로고
    • A public-key cryptosystem and a signature scheme based on discrete logarithms
    • July
    • T. El-Gamal: A public-key cryptosystem and a signature scheme based on discrete logarithms, In: IEEE Transactions on Information Theory, vol. IT-31:4, pp. 469-472, July 1985.
    • (1985) IEEE Transactions on Information Theory , vol.IT-31 , Issue.4 , pp. 469-472
    • El-Gamal, T.1
  • 8
    • 0000838441 scopus 로고
    • Uses of elliptic curves modulo lage primes
    • Springer Verlag
    • V. Miller: Uses of elliptic curves modulo lage primes, In: Advances in Cryptology -Crypto'85, Springer Verlag, pp. 417-426, 1986.
    • (1986) Advances in Cryptology -Crypto'85 , pp. 417-426
    • Miller, V.1
  • 9
    • 84968503742 scopus 로고
    • Elliptic curve cryptosystems
    • N. Koblitz: Elliptic curve cryptosystems, In: Math. Comp., vol. 48, pp. 203-209, 1987.
    • (1987) Math. Comp. , vol.48 , pp. 203-209
    • Koblitz, N.1
  • 10
    • 0000653210 scopus 로고    scopus 로고
    • Selecting cryptographic key sizes
    • A. K. Lenstra, and E. R. Verheul: Selecting Cryptographic Key Sizes, In: Journal of Cryptology, vol. 14:4, pp. 255-293, 2001.
    • (2001) Journal of Cryptology , vol.14 , Issue.4 , pp. 255-293
    • Lenstra, A.K.1    Verheul, E.R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.