-
1
-
-
33750211810
-
Estimates of the number of cancer patients hospitalized in a geographic area using claims data without a unique personal identifier
-
Couris CM, Gutknecht C, Ecochard R. Gelas-Dore B, Hajri T, Colin C, Schott AM. Estimates of the number of cancer patients hospitalized in a geographic area using claims data without a unique personal identifier. Methods Inf Med 2006; 45: 515-522.
-
(2006)
Methods Inf Med
, vol.45
, pp. 515-522
-
-
Couris, C.M.1
Gutknecht, C.2
Ecochard, R.3
Gelas-Dore, B.4
Hajri, T.5
Colin, C.6
Schott, A.M.7
-
3
-
-
0031656168
-
Automatic record hash coding and linkage for epidemiological follow-up data confidentiality
-
Quantin C, Bouzelat H, Allaert FA, Benhamiche AM, Faivre J, Dusserre L. Automatic record hash coding and linkage for epidemiological follow-up data confidentiality. Methods Inf Med 1998; 37: 271-277.
-
(1998)
Methods Inf Med
, vol.37
, pp. 271-277
-
-
Quantin, C.1
Bouzelat, H.2
Allaert, F.A.3
Benhamiche, A.M.4
Faivre, J.5
Dusserre, L.6
-
5
-
-
3042683432
-
Message authentication using hash functions
-
Available at
-
Bellare M, Canetti R, Krawczyck H. Message authentication using hash functions. The HMAC construction, RSA laboratories' CyrptoBytes 1996, 2: 1-5. Available at http://www.cs.ucsd.edu/users/mihir/papers/hmac.html/
-
(1996)
The HMAC construction, RSA laboratories' CyrptoBytes
, vol.2
, pp. 1-5
-
-
Bellare, M.1
Canetti, R.2
Krawczyck, H.3
-
7
-
-
16244391779
-
Decision analysis for the assessment of a record linkage procedure: Application to a perinatal network
-
Quantin C, Binquet C, Allaert FA, Cornet B, Pattisina R. Le Teuff G, Ferdynus C, Gouyon JB. Decision analysis for the assessment of a record linkage procedure: application to a perinatal network. Methods Inf Med 2005; 44: 72-79.
-
(2005)
Methods Inf Med
, vol.44
, pp. 72-79
-
-
Quantin, C.1
Binquet, C.2
Allaert, F.A.3
Cornet, B.4
Pattisina, R.5
Le Teuff, G.6
Ferdynus, C.7
Gouyon, J.B.8
-
9
-
-
33947655894
-
-
Quantin C, Cohen o, Riandey B, Allaert FA. Unique patient concept: a key choice for European epidemiology. International Journal of Medical Informatics 2007; 76: 419-426.
-
Quantin C, Cohen o, Riandey B, Allaert FA. Unique patient concept: a key choice for European epidemiology. International Journal of Medical Informatics 2007; 76: 419-426.
-
-
-
-
10
-
-
35548961776
-
-
Quantin C, Allaert FA, Fassa M, Riandey B, Fieschi M, Cohen O. How to manage a secure direct access of European patients to their computerised medical record and personal medical record? Technology and Informatics 2007; 127: 246-255.
-
(2007)
How to manage a secure direct access of European patients to their computerised medical record and personal medical record? Technology and Informatics
, vol.127
, pp. 246-255
-
-
Quantin, C.1
Allaert, F.A.2
Fassa, M.3
Riandey, B.4
Fieschi, M.5
Cohen, O.6
-
11
-
-
85031641606
-
Réflexion autour de l'anonymat dans le traitement des données de santé.
-
Vuillet-Tavernier S. Réflexion autour de l'anonymat dans le traitement des données de santé. Med et Droit 2000; 40:1-4
-
(2000)
Med et Droit
, vol.40
, pp. 1-4
-
-
Vuillet-Tavernier, S.1
-
12
-
-
55049115363
-
Purposes of Health Identification Cards in Belgium In: Engelbrecht R
-
Geissbuhler A, Clovis C, Mihalas G eds, Amsterdam: IOS Press;
-
Roger France FH, De Clercq E, Bangels M. Purposes of Health Identification Cards in Belgium In: Engelbrecht R. Geissbuhler A, Clovis C, Mihalas G (eds). Connecting Medical Informatics and Bio-Informatics. Proceedings of MIE 2005. Amsterdam: IOS Press; 2005.
-
(2005)
Connecting Medical Informatics and Bio-Informatics. Proceedings of MIE
-
-
Roger France, F.H.1
De Clercq, E.2
Bangels, M.3
-
13
-
-
0035231139
-
The Swiss solution for anonymously chaining patient files
-
IMIA
-
Borst F, Allaert FA, Quantin C. The Swiss solution for anonymously chaining patient files. Proc MEDINFO 2001; IMIA: 1239-1241.
-
(2001)
Proc MEDINFO
, pp. 1239-1241
-
-
Borst, F.1
Allaert, F.A.2
Quantin, C.3
-
14
-
-
55049120484
-
-
http//en.wikipedia.org/wiki/SHA_hash_funtions
-
-
-
-
15
-
-
0035229267
-
-
Ethridge Y. PKI (public key infrastructure): how and why it works. Health Manag Technol 2001; 22: 20-21.
-
Ethridge Y. PKI (public key infrastructure): how and why it works. Health Manag Technol 2001; 22: 20-21.
-
-
-
-
16
-
-
55049096984
-
Tierces Parties de Confiance interopérables (TPCi) - interoperable Trusted Third Parties (iTTP)
-
Paris, June 1-3
-
Trouessin G. Tierces Parties de Confiance interopérables (TPCi) - interoperable Trusted Third Parties (iTTP). Colloque InfoSec'99 (Securicom'99). La Défense, Paris, June 1-3, 1999.
-
(1999)
Colloque InfoSec'99 (Securicom'99). La Défense
-
-
Trouessin, G.1
-
17
-
-
0003855464
-
-
Paris, France: International Thomson Publishing;
-
Schneier B. Applied Cryptography. Paris, France: International Thomson Publishing; 1994.
-
(1994)
Applied Cryptography
-
-
Schneier, B.1
|