-
2
-
-
74049145063
-
-
Classifeye. http://www.classifeye.com/.
-
Classifeye
-
-
-
3
-
-
70350381719
-
-
Google Health. https://www.google.com/health/.
-
Google Health
-
-
-
9
-
-
77953904148
-
Recommendation for key management
-
E. Barker, W. Barker, W. Burr, W. Polk, and M. Smid. Recommendation for key management. NIST Special Publication 800-57, 2007.
-
(2007)
NIST Special Publication
, vol.800 -57
-
-
Barker, E.1
Barker, W.2
Burr, W.3
Polk, W.4
Smid, M.5
-
12
-
-
33646870054
-
Collusion resistant broadcast encryption with short ciphertexts and private keys
-
D. Boneh, C. Gentry, and B. Waters. Collusion resistant broadcast encryption with short ciphertexts and private keys. In CRYPTO '05: Advances in Cryptology, 2005.
-
(2005)
CRYPTO '05: Advances in Cryptology
-
-
Boneh, D.1
Gentry, C.2
Waters, B.3
-
15
-
-
74049094570
-
Standards for e cient cryptography
-
Certicom Research
-
Certicom Research. Standards for e cient cryptography, SEC 1: Elliptic curve cryptography, 2000.
-
(2000)
Elliptic curve cryptography
, vol.SEC 1
-
-
-
19
-
-
33845638417
-
How to break access control in a controlled manner
-
A. Ferreira, R. Cruz-Correia, L. Antunes, P. Farinha, E. Oliveira-Palhares, D. Chadwick, and A. Costa-Pereira. How to break access control in a controlled manner. In CMBS '06: IEEE Symposium on Computer-Based Medical Systems, 2006.
-
(2006)
CMBS '06: IEEE Symposium on Computer-Based Medical Systems
-
-
Ferreira, A.1
Cruz-Correia, R.2
Antunes, L.3
Farinha, P.4
Oliveira-Palhares, E.5
Chadwick, D.6
Costa-Pereira, A.7
-
21
-
-
49049111604
-
Bounded ciphertext policy attribute based encryption
-
V. Goyal, A. Jain, O. Pandey, and A. Sahai. Bounded ciphertext policy attribute based encryption. In ICALP '08: International Colloquium on Automata, Languages and Programming, Part II, 2008.
-
(2008)
ICALP '08: International Colloquium on Automata, Languages and Programming, Part II
-
-
Goyal, V.1
Jain, A.2
Pandey, O.3
Sahai, A.4
-
23
-
-
74049145062
-
System providing medical personnel with immediate critical data for emergency treatments
-
Patent Application Publication 11/510,317, 2007
-
T. Hinkamp. System providing medical personnel with immediate critical data for emergency treatments. Patent Application Publication 11/510,317, 2007.
-
-
-
Hinkamp, T.1
-
25
-
-
52349122571
-
A new method for generating an invariant iris private key based on the fuzzy vault system
-
October
-
Y. J. Lee, K. R. Park, S. J. Lee, K. Bae, and J. Kim. A new method for generating an invariant iris private key based on the fuzzy vault system. IEEE Transactions on Systems, Man, and Cybernetics, 38(5), October 2008.
-
(2008)
IEEE Transactions on Systems, Man, and Cybernetics
, vol.38
, Issue.5
-
-
Lee, Y.J.1
Park, K.R.2
Lee, S.J.3
Bae, K.4
Kim, J.5
-
26
-
-
84951915056
-
AMON: A wearable medical computer for high risk patients
-
P. Lukowicz, U. Anliker, J. Ward, G. Troster, E. Hirt, and C. Neufelt. AMON: a wearable medical computer for high risk patients. In ISWC '02: International Symposium on Wearable Computers, 2002.
-
(2002)
ISWC '02: International Symposium on Wearable Computers
-
-
Lukowicz, P.1
Anliker, U.2
Ward, J.3
Troster, G.4
Hirt, E.5
Neufelt, C.6
-
27
-
-
0029696153
-
A simple scheme to make passwords based on one-way functions much harder to crack
-
U. Manber. A simple scheme to make passwords based on one-way functions much harder to crack. Computers and Security, 15(2), 1996.
-
(1996)
Computers and Security
, vol.15
, Issue.2
-
-
Manber, U.1
-
28
-
-
74049122121
-
-
MedicAlert. E-healthkey. http://www.healthcentral. com/migraine/reviews- 202629-5.html.
-
MedicAlert. E-healthkey
-
-
-
29
-
-
74049109107
-
Which prescription drugs could create a deadly combination?
-
May 2007. Available at
-
C. Myers. Which prescription drugs could create a deadly combination? ABC13 Eyewitness News, May 2007. Available at http://abclocal.go.com/ ktrk/ story?section=news/health&id=5320077.
-
ABC13 Eyewitness News
-
-
Myers, C.1
-
33
-
-
50549101800
-
Public key broadcast encryption schemes with shorter transmissions
-
September
-
J. H. Park, H. J. Kim, M. Sung, and D. H. Lee. Public key broadcast encryption schemes with shorter transmissions. IEEE Transaction on Broadcasting, 54(3), September 2008.
-
(2008)
IEEE Transaction on Broadcasting
, vol.54
, Issue.3
-
-
Park, J.H.1
Kim, H.J.2
Sung, M.3
Lee, D.H.4
-
37
-
-
74049121048
-
Cirque de Soleil settles with gymnast fired over HIV
-
April
-
L. Romney. Cirque de Soleil settles with gymnast fired over HIV. Los Angeles Times, April 2004.
-
(2004)
Los Angeles Times
-
-
Romney, L.1
-
40
-
-
74049139302
-
-
V. Shoup. A proposal for an ISO standard for public key encryption version 2.1, Available at, 2001
-
V. Shoup. A proposal for an ISO standard for public key encryption (version 2.1). Available at http://www.shoup.net/papers/iso-2-1.pdf, 2001.
-
-
-
-
41
-
-
33644682163
-
Personal health records: Definitions, benefits, and strategies for overcoming barriers to adoption
-
P. Tang, J. Ash, D. Bates, J. Overhage, and D. Sands. Personal health records: Definitions, benefits, and strategies for overcoming barriers to adoption. Journal of the American Medical Informatics Association, 13(2), 2006.
-
(2006)
Journal of the American Medical Informatics Association
, vol.13
, Issue.2
-
-
Tang, P.1
Ash, J.2
Bates, D.3
Overhage, J.4
Sands, D.5
-
42
-
-
74049160145
-
-
United States Court of Appeals. Stephen C. Orr vs. Wal-Mart Stores, Inc. Appeal from the United States District Court for the District of Nebraska, (01-2959), July 2002.
-
United States Court of Appeals. Stephen C. Orr vs. Wal-Mart Stores, Inc. Appeal from the United States District Court for the District of Nebraska, (01-2959), July 2002.
-
-
-
-
43
-
-
69649091318
-
Ciphertext-policy attribute-based encryption: An expressive, e cient, and provably secure realization. Cryptology ePrint Archive
-
Report 2008/290, Available at
-
B. Waters. Ciphertext-policy attribute-based encryption: An expressive, e cient, and provably secure realization. Cryptology ePrint Archive, Report 2008/290, 2008. Available at http://eprint.iacr.org/2008/290/.
-
(2008)
-
-
Waters, B.1
-
45
-
-
33847256995
-
Security threat posed by USB-based personal health records
-
A. Wright and D. Sittig. Security threat posed by USB-based personal health records. Annals of internal medicine, 146(4), 2007.
-
(2007)
Annals of internal medicine
, vol.146
, Issue.4
-
-
Wright, A.1
Sittig, D.2
|