-
4
-
-
30944444245
-
-
RSA Security Inc. Consumer perceptions about security. 2003. Available from: http://www.rsasecurity.com/ solutions/topics/whitepapers/CSPS_WP_0903.pdf
-
(2003)
Consumer Perceptions about Security
-
-
-
5
-
-
30944469918
-
-
RSA Security Inc. An enterprise perspective on identity theft. 2003. Available from: http://www.rsasecurity.com/ solutions/idmgt/whitepapers/ IDT_WP_1003.pdf
-
(2003)
An Enterprise Perspective on Identity Theft
-
-
-
6
-
-
0003699872
-
-
Washington, DC: National Academy Press
-
Committee on Maintaining Privacy and Security in Health Care Applications of the National Information Infrastructure. For the record: Protecting electronic health information. Washington, DC: National Academy Press. 1997. Available from: http://www.nap.edu/readingroom/books/ftr/52e6.html
-
(1997)
For the Record: Protecting Electronic Health Information
-
-
-
8
-
-
0036489322
-
A data hiding technique with authentication, integration, and confidentiality for electronic patient records
-
Chao HM, Hsu CM, Miaou SG. A data hiding technique with authentication, integration, and confidentiality for electronic patient records. IEEE Transactions on Information Technology in Biomedicine 2002;6:46-53.
-
(2002)
IEEE Transactions on Information Technology in Biomedicine
, vol.6
, pp. 46-53
-
-
Chao, H.M.1
Hsu, C.M.2
Miaou, S.G.3
-
9
-
-
0033283123
-
Remote access to medical records via the Internet: Feasibility, security and multilingual considerations
-
Lees PJ, Chronaki CE, Simantirakis EN, Kostomanolakis SG, Orphanoudakis SC, Vardas PE. Remote access to medical records via the Internet: feasibility, security and multilingual considerations. Computers in Cardiology 1999;26:89-92.
-
(1999)
Computers in Cardiology
, vol.26
, pp. 89-92
-
-
Lees, P.J.1
Chronaki, C.E.2
Simantirakis, E.N.3
Kostomanolakis, S.G.4
Orphanoudakis, S.C.5
Vardas, P.E.6
-
10
-
-
18944385599
-
Electronic multimedia data management for remote population in Ecuador
-
Rafiq A, Zhao X, Cone S, Merrell R. Electronic multimedia data management for remote population in Ecuador. International Congress Series 2004;1268:301-306.
-
(2004)
International Congress Series
, vol.1268
, pp. 301-306
-
-
Rafiq, A.1
Zhao, X.2
Cone, S.3
Merrell, R.4
-
11
-
-
0742325040
-
Analysis of the SPEKE password-authenticated key exchange protocol
-
Zhang M. Analysis of the SPEKE password-authenticated key exchange protocol. IEEE Communications Letters 2004;8:63-65.
-
(2004)
IEEE Communications Letters
, vol.8
, pp. 63-65
-
-
Zhang, M.1
-
12
-
-
0033899298
-
BioID: A multimodal biometric identification system
-
Frischholz RW, Dieckmann U. BioID: A multimodal biometric identification system. Computer 2000;33:64-68.
-
(2000)
Computer
, vol.33
, pp. 64-68
-
-
Frischholz, R.W.1
Dieckmann, U.2
-
13
-
-
26844446463
-
AHUMADA: A large speech corpus in Spanish for speaker identification and verification
-
Proceedings of IEEE International Conference
-
Ortega-Garcia J, Gonzalez-Rodriguez J, Marrero-Aguiar V, Diaz-Gomez CJJ, Garcia-Jimenez CR, Lucena-Molina CJ, Sanchez-Molero TJAG. AHUMADA: A large speech corpus in Spanish for speaker identification and verification. Proceedings of IEEE International Conference. Acoustics, Speech and Signal Processing 1998;2:773-776.
-
(1998)
Acoustics, Speech and Signal Processing
, vol.2
, pp. 773-776
-
-
Ortega-Garcia, J.1
Gonzalez-Rodriguez, J.2
Marrero-Aguiar, V.3
Diaz-Gomez, C.J.J.4
Garcia-Jimenez, C.R.5
Lucena-Molina, C.J.6
Sanchez-Molero, T.J.A.G.7
-
14
-
-
0026121425
-
Dimensionality reduction and feature extraction applications in identifying computer users
-
Bleha SA, Obaidat MS. Dimensionality reduction and feature extraction applications in identifying computer users. IEEE Transactions on Systems, Man, and Cybernetics 1991;21:452-456.
-
(1991)
IEEE Transactions on Systems, Man, and Cybernetics
, vol.21
, pp. 452-456
-
-
Bleha, S.A.1
Obaidat, M.S.2
-
18
-
-
85008047802
-
Biometrics and the threat to civil liberties
-
Johnson ML. Biometrics and the threat to civil liberties. Computer 2004;37:90-92.
-
(2004)
Computer
, vol.37
, pp. 90-92
-
-
Johnson, M.L.1
-
19
-
-
30944460216
-
Biometric identity theft
-
McKee G. Biometric identity theft [Letters]. Computer 2000;33:5-10 .
-
(2000)
Computer
, vol.33
, pp. 5-10
-
-
McKee, G.1
-
21
-
-
0031412049
-
Developing a secure healthcare information network on the Internet
-
Calcote S. Developing a secure healthcare information network on the Internet. Healthcare Financial Management 1997;51:68.
-
(1997)
Healthcare Financial Management
, vol.51
, pp. 68
-
-
Calcote, S.1
-
22
-
-
0032031231
-
The electronic patient record: The management of access - Case study: Leiden University Hospital
-
Louwerse K. The electronic patient record: The management of access - case study: Leiden University Hospital. International Journal of Medical Informatics 1998;49:39-44.
-
(1998)
International Journal of Medical Informatics
, vol.49
, pp. 39-44
-
-
Louwerse, K.1
-
23
-
-
21444454151
-
Towards a practical healthcare information security model for healthcare institution
-
Dwivedi A, Bali RK, Belsis MA, Naguib RNG, Every P, Nassar NS. Towards a practical healthcare information security model for healthcare institution. The 4th International IEEE EMBS Special Topic Conference on Information Technology Applications in Biomedicine 2003. p 114-117.
-
(2003)
The 4th International IEEE EMBS Special Topic Conference on Information Technology Applications in Biomedicine
, pp. 114-117
-
-
Dwivedi, A.1
Bali, R.K.2
Belsis, M.A.3
Naguib, R.N.G.4
Every, P.5
Nassar, N.S.6
-
24
-
-
0034317353
-
Architecture for networked electronic patient record systems
-
Takeda H, Matsumura Y, Kuwata S, Nakano H, Sakamoto N, Yamamoto R. Architecture for networked electronic patient record systems. International Journal of Medical Informatics 2000;60:161-167.
-
(2000)
International Journal of Medical Informatics
, vol.60
, pp. 161-167
-
-
Takeda, H.1
Matsumura, Y.2
Kuwata, S.3
Nakano, H.4
Sakamoto, N.5
Yamamoto, R.6
-
29
-
-
85062131275
-
-
Lovorn J. The power of PKI. Health Management Technology. 2001. Available from: http://www.healthmgttech. com/archives/h1201power.htm
-
(2001)
The Power of PKI
-
-
Lovorn, J.1
-
30
-
-
0042468088
-
Public key infrastructure: A micro and macro analysis
-
Lancaster S, Yen DC, Huang SM. Public key infrastructure: A micro and macro analysis. Computer Standards & Interfaces 2003;25:437-446. Available from: http://www.elsevier.com/locate/csi
-
(2003)
Computer Standards & Interfaces
, vol.25
, pp. 437-446
-
-
Lancaster, S.1
Yen, D.C.2
Huang, S.M.3
-
31
-
-
80052087271
-
-
What's a PKI? Available from: http://www.entrust.com/resources/pdf/ whatsapki.pdf
-
What's a PKI?
-
-
-
32
-
-
0041524988
-
PKI policy pitfalls
-
July
-
Bobbitt M. PKI policy pitfalls. Information Security Magazine 2001;July. Available from: http://www.infosecuritymag.com/articles/july01/features_pki. shtml
-
(2001)
Information Security Magazine
-
-
Bobbitt, M.1
-
33
-
-
1542361507
-
Trust negotiation for authentication and authorization in healthcare information systems
-
Vawdrey DK, Sundelin TL, Seamons KE, Knutson CD. Trust negotiation for authentication and authorization in healthcare information systems. Proceedings of the 25th IEEE Annual International Conference on Engineering in Medicine and Biology Society 2003, 2, p 1406-1409.
-
(2003)
Proceedings of the 25th IEEE Annual International Conference on Engineering in Medicine and Biology Society
, vol.2
, pp. 1406-1409
-
-
Vawdrey, D.K.1
Sundelin, T.L.2
Seamons, K.E.3
Knutson, C.D.4
-
34
-
-
0037132492
-
The patient clinical information system (PatCIS): Technical solutions for and experience with giving patients access to their electronic medical records
-
Cimino JJ, Patel VL, Kushniruk AW. The patient clinical information system (PatCIS): technical solutions for and experience with giving patients access to their electronic medical records. International Journal of Medical Informatics 2002;68:113-127.
-
(2002)
International Journal of Medical Informatics
, vol.68
, pp. 113-127
-
-
Cimino, J.J.1
Patel, V.L.2
Kushniruk, A.W.3
|