-
1
-
-
3142655961
-
Managing Healthcare Data Hippocratically
-
Paris, France, June
-
R. Agrawal, A. Kini, K. LeFevre, A. Wang, Y. Xu, D. Zhou, "Managing Healthcare Data Hippocratically," Proc. of ACM SIGMOD International Conference on Management of Data, Paris, France, June 2004.
-
(2004)
Proc. of ACM SIGMOD International Conference on Management of Data
-
-
Agrawal, R.1
Kini, A.2
LeFevre, K.3
Wang, A.4
Xu, Y.5
Zhou, D.6
-
2
-
-
0033120274
-
Security in Health-care Information Systems-current Trends
-
April
-
E. Smith, , J. Eloff, "Security in Health-care Information Systems-current Trends," International Journal of Medical Informatics, Vol. 54(1), pp.39-54, April 1999.
-
(1999)
International Journal of Medical Informatics
, vol.54
, Issue.1
, pp. 39-54
-
-
Smith, E.1
Eloff, J.2
-
3
-
-
44249090291
-
A Security Architecture for e-Health Services
-
Korea, February
-
R. Sulaiman, D. Sharma, W. Ma, D. Tran, "A Security Architecture for e-Health Services," The 10th International Conference on Advanced Communication Technology, Korea, February 2008.
-
(2008)
The 10th International Conference on Advanced Communication Technology
-
-
Sulaiman, R.1
Sharma, D.2
Ma, W.3
Tran, D.4
-
5
-
-
74549127968
-
A Current Perspective on Encryption Algorithms
-
September, Available:, Accessed June 2009
-
L. Brown, "A Current Perspective on Encryption Algorithms," AUUG (Canberra) Summer Conference, September 1998. Available: http://www.unsw.adfa.edu.au/~lpb/papers/cauugs98/ [Accessed June 2009].
-
(1998)
AUUG (Canberra) Summer Conference
-
-
Brown, L.1
-
7
-
-
4243068589
-
Empirical Evidence Concerning AES
-
October
-
P. Hellekalek, S. Wegenkittl, "Empirical Evidence Concerning AES," ACM Transactions on Modeling and Computer Simulation (TOMACS), Vol. 13, No. 4, pp. 322-333, October 2003.
-
(2003)
ACM Transactions on Modeling and Computer Simulation (TOMACS)
, vol.13
, Issue.4
, pp. 322-333
-
-
Hellekalek, P.1
Wegenkittl, S.2
-
8
-
-
74549153107
-
Evaluation of the RC4 Algorithm for Data Encryption
-
June
-
A. Mousa, A. Hamad, "Evaluation of the RC4 Algorithm for Data Encryption," Proc. Of International Journal Computer Science & Applications, Vol.3, No.2, June 2006.
-
(2006)
Proc. Of International Journal Computer Science & Applications
, vol.3
, Issue.2
-
-
Mousa, A.1
Hamad, A.2
-
9
-
-
74549219702
-
-
Dr. Dobb's Journal, September, Available:, Accessed August 2009
-
B. Schneier, "The Blowfish Encryption Algorithm - One Year Later," Dr. Dobb's Journal, September 1995. Available: http://www.schneier. com/paper-blowfish-oneyear.html [Accessed August 2009].
-
(1995)
The Blowfish Encryption Algorithm - One Year Later
-
-
Schneier, B.1
-
10
-
-
84944029559
-
New Weak Key Classes of IDEA, Springer Berlin
-
A. Biryukov, J. Nakahara, B. Preneel, J. Vandewalle, "New Weak Key Classes of IDEA," Springer Berlin, Lecture Notes In Computer Science, Vol. 2513, pp 315-326, 2002.
-
(2002)
Lecture Notes In Computer Science
, vol.2513
, pp. 315-326
-
-
Biryukov, A.1
Nakahara, J.2
Preneel, B.3
Vandewalle, J.4
-
11
-
-
74549121822
-
A Framework of Authentication and Authorization for e-Health Services
-
November
-
S. Han, G. Skinner, V. Potdar, E. Chang, "A Framework of Authentication and Authorization for e-Health Services," Proc. of the 3rd ACM workshop on secure web services, pp. 105-106, November 2006.
-
(2006)
Proc. of the 3rd ACM workshop on secure web services
, pp. 105-106
-
-
Han, S.1
Skinner, G.2
Potdar, V.3
Chang, E.4
-
12
-
-
52149103544
-
Timestamp Authentication Protocol for Remote Monitoring in eHealth
-
Tampere, Finland, pp, January-February
-
K. Elmufti, D. Weerasinghe, M. Rajarajan, V. Rakocevic, S. Khan, "Timestamp Authentication Protocol for Remote Monitoring in eHealth," The 2nd International Conference on Pervasive Computing Technologies for Healthcare, Tampere, Finland, pp. 73-76, January-February 2008.
-
(2008)
The 2nd International Conference on Pervasive Computing Technologies for Healthcare
, pp. 73-76
-
-
Elmufti, K.1
Weerasinghe, D.2
Rajarajan, M.3
Rakocevic, V.4
Khan, S.5
-
13
-
-
74549213551
-
-
Available:, Accessed August 2009
-
B. Schneiner, "Key Length and Security," 1999, Available: http://www.windowsecurity.com/uplarticle/4/keylength.txt [Accessed August 2009].
-
(1999)
Key Length and Security
-
-
Schneiner, B.1
-
14
-
-
0003402107
-
-
January, 1996. Available:, Accessed August 2009
-
M. Blaze, W. Diffie, R. Rivest, B. Schneier, T. Shinomura, E. Thompson, M. Wiener, "Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security," January, 1996. Available: http://www.schneier.com/ paper-keylength.html [Accessed August 2009].
-
Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security
-
-
Blaze, M.1
Diffie, W.2
Rivest, R.3
Schneier, B.4
Shinomura, T.5
Thompson, E.6
Wiener, M.7
-
15
-
-
74549176902
-
-
April 25, 2005. Available:, Accessed August 2009
-
D. Bernstein, "Understanding brute force," April 25, 2005. Available: http://cr.yp.to/snuffle/bruteforce-20050425.pdf [Accessed August 2009].
-
Understanding brute force
-
-
Bernstein, D.1
-
16
-
-
74549130337
-
-
Available:, Accessed June 2009
-
Distributed.net. Available: http://distributed.net/ [Accessed June 2009]
-
-
-
-
17
-
-
50249126670
-
A Workflow-based Access Control Framework for e-Health Applications
-
Workshops, pp, March
-
G. Russello, C. Dong, N. Dulay, "A Workflow-based Access Control Framework for e-Health Applications," Proc. of the 22nd International Conference on Advanced Information Networking and Applications - Workshops, pp. 111-120, March 2008.
-
(2008)
Proc. of the 22nd International Conference on Advanced Information Networking and Applications
, pp. 111-120
-
-
Russello, G.1
Dong, C.2
Dulay, N.3
-
19
-
-
84926191372
-
The Evolving Face of TeleMedicine & E-Health: Opening Doors and Closing Gaps in E-Health Services Opportunities & Challenges
-
January
-
J. Wen, J. Tan, "The Evolving Face of TeleMedicine & E-Health: Opening Doors and Closing Gaps in E-Health Services Opportunities & Challenges," Proc. of the 36th Annual Hawaii International Conference on System Sciences, Vol.6, pp. 172b, January 2003.
-
(2003)
Proc. of the 36th Annual Hawaii International Conference on System Sciences
, vol.6
-
-
Wen, J.1
Tan, J.2
|