-
1
-
-
71749089189
-
Integrating Data Custodians in eHealth Grids-A Digest of Security and Privacy Aspects
-
Informatik 2006-Informatik für Menschen, Lecture Notes in Informatics (LNI)
-
J. Fingberg, M. Hansen, M. Hansen, H. Krasemann, L. Lo Iacono, T. Probst, and J. Wright: Integrating Data Custodians in eHealth Grids-A Digest of Security and Privacy Aspects, In: Christian Hochberger, and Rüdiger Liskowsky (Eds. ), Informatik 2006-Informatik für Menschen, Lecture Notes in Informatics (LNI) vol. P-93, pp. 695-701, 2006.
-
(2006)
Christian Hochberger and Rüdiger Liskowsky
, vol.P93
, pp. 695-701
-
-
Fingberg, J.1
Hansen, M.2
Hansen, M.3
Krasemann, H.4
Lo Iacono, L.5
Probst, T.6
Wright, J.7
-
2
-
-
77955516185
-
Keyed hash functions
-
E. Dawson and Jovan Golic (Eds. ), Cryptography: Policy and Algorithms Springer-Verlag
-
S. Bakhtiari, R. Safavi-Naini, and J. Pieprzyk: Keyed hash functions, In: E. Dawson, and Jovan Golic (Eds. ), Cryptography: Policy and Algorithms, Lecture Notes in Computer Science, vol. 1029, pp. 201-214, Springer-Verlag, 1996.
-
(1996)
Lecture Notes in Computer Science
, vol.1029
, pp. 201-214
-
-
Bakhtiari, S.1
Safavi-Naini, R.2
Pieprzyk, J.3
-
3
-
-
15544389962
-
Secondary use of the EHR via pseudonymisation
-
In: L. Bos, S. Laxminarayan, A. Marsh (Eds. ) IOS Press, Amsterdam
-
K. Pommerening, and M. Reng: Secondary use of the EHR via pseudonymisation, In: L. Bos, S. Laxminarayan, A. Marsh (Eds. ), Medical Care Compunetics 1, pp. 441-446, IOS Press, Amsterdam 2004.
-
(2004)
Medical Care Compunetics
, vol.1
, pp. 441-446
-
-
Pommerening, K.1
Reng, M.2
-
4
-
-
28444475268
-
Security and confidentiality approach for the Clinical E-Science Framework (CLEF)
-
Nottingham (UK)
-
D. Kalra, P. Singleton, D. Ingram, J. Milan, J. MacKay, D. Detmer, and A. Rector: Security and confidentiality approach for the Clinical E-Science Framework (CLEF), In: Second UK E-Science All Hands Meeting, Nottingham (UK), 2003.
-
(2003)
Second UK E-Science All Hands Meeting
-
-
Kalra, D.1
Singleton, P.2
Ingram, D.3
Milan, J.4
Mackay, J.5
Detmer, D.6
Rector, A.7
-
5
-
-
21944457134
-
A linkable identity privacy algorithm for healthgrid
-
In: T. Solomonides, R. McClatchey, V. Breton, Y. Legré and S. Norager (Eds. )
-
N. Zhang, A. Rector, I. Buchan, Q. Shi, D. Kalra, J. Rogers, C. Goble, S. Walker, D. Ingram, and P. Singleton: A Linkable Identity Privacy Algorithm for HealthGrid, In: T. Solomonides, R. McClatchey, V. Breton, Y. Legré, and S. Norager (Eds. ), Proceedings of Healthgrid 2005, Studies in Health Technology and Informatics, vol. 112, 2005.
-
(2005)
Proceedings of Healthgrid 2005, Studies in Health Technology and Informatics
, vol.112
-
-
Zhang, N.1
Rector, A.2
Buchan, I.3
Shi, Q.4
Kalra, D.5
Rogers, J.6
Goble, C.7
Walker, S.8
Ingram, D.9
Singleton, P.10
-
6
-
-
0017018484
-
New directions in cryptography
-
November
-
W. Diffie, and M. E. Hellman: New directions in cryptography, In: IEEE Transactions on Information Theory, vol. IT-22:6, pp. 644-654, November 1976.
-
(1976)
IEEE Transactions on Information Theory
, vol.IT22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
7
-
-
84874800178
-
A public-key cryptosystem and a signature scheme based on discrete logarithms
-
July
-
T. El-Gamal: A public-key cryptosystem and a signature scheme based on discrete logarithms, In: IEEE Transactions on Information Theory, vol. IT-31:4, pp. 469-472, July 1985.
-
(1985)
IEEE Transactions on Information Theory
, vol.IT-31
, Issue.4
, pp. 469-472
-
-
El-Gamal, T.1
-
8
-
-
0000838441
-
Uses of elliptic curves modulo lage primes
-
Springer Verlag
-
V. Miller: Uses of elliptic curves modulo lage primes, In: Advances in Cryptology -Crypto'85, Springer Verlag, pp. 417-426, 1986.
-
(1986)
Advances in Cryptology -Crypto'85
, pp. 417-426
-
-
Miller, V.1
-
9
-
-
84968503742
-
Elliptic curve cryptosystems
-
N. Koblitz: Elliptic curve cryptosystems, In: Math. Comp., vol. 48, pp. 203-209, 1987.
-
(1987)
Math. Comp.
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
10
-
-
0000653210
-
Selecting cryptographic key sizes
-
A. K. Lenstra, and E. R. Verheul: Selecting Cryptographic Key Sizes, In: Journal of Cryptology, vol. 14:4, pp. 255-293, 2001.
-
(2001)
Journal of Cryptology
, vol.14
, Issue.4
, pp. 255-293
-
-
Lenstra, A.K.1
Verheul, E.R.2
|