-
1
-
-
2942706124
-
Building the national health information infrastructure for personal health, health care services, public health, and research
-
Detmer D. E., Building the national health information infrastructure for personal health, health care services, public health, and research BMC Medical Informatics and Decision Making 2003 3, article 1
-
(2003)
BMC Medical Informatics and Decision Making
, vol.31
-
-
Detmer, D.E.1
-
2
-
-
84904385271
-
Remote medical monitoring
-
Jurik A. D., Weaver A. C., Remote medical monitoring Computer 2008 41 4 96 99
-
(2008)
Computer
, vol.41
, Issue.4
, pp. 96-99
-
-
Jurik, A.D.1
Weaver, A.C.2
-
3
-
-
0037356689
-
Outcomes of an integrated telehealth network demonstration project
-
DOI 10.1089/153056203763317611
-
Dimmick S. L., Burgiss S. G., Robbins S., Black D., Jarnagin B., Anders M., Outcomes of an integrated telehealth network demonstration project Telemedicine Journal and E-Health 2003 9 1 13 23 (Pubitemid 36397889)
-
(2003)
Telemedicine Journal and e-Health
, vol.9
, Issue.1
, pp. 13-23
-
-
Dimmick, S.L.1
Burgiss, S.G.2
Robbins, S.3
Black, D.4
Jarnagin, B.5
Anders, M.6
-
4
-
-
33845642932
-
Pervasive health care applications face tough security challenges
-
Stanford V., Pervasive health care applications face tough security challenges IEEE Pervasive Computing 2002 1 2 8 12
-
(2002)
IEEE Pervasive Computing
, vol.1
, Issue.2
, pp. 8-12
-
-
Stanford, V.1
-
5
-
-
84889974585
-
Challenges in data quality assurance in pervasive health monitoring systems
-
Gawrock D. Reimer H. Sadeghi A. R. Vishik C.
-
Sriram J., Shin M., Kotz D., Rajan A., Sastry M., Yarvis M., Gawrock D., Reimer H., Sadeghi A. R., Vishik C., Challenges in data quality assurance in pervasive health monitoring systems Future of Trust in Computing. Lecture Notes in Computer Science 2009
-
(2009)
Future of Trust in Computing. Lecture Notes in Computer Science
-
-
Sriram, J.1
Shin, M.2
Kotz, D.3
Rajan, A.4
Sastry, M.5
Yarvis, M.6
-
6
-
-
0002544658
-
Software security and privacy risks in mobile E- commerce
-
DOI 10.1145/359205.359227
-
Ghosh A. K., Swaminatha T. M., Software security and privacy risks in mobile e-commerce Communications of the ACM 2001 44 2 51 57 (Pubitemid 33631854)
-
(2001)
Communications of the ACM
, vol.44
, Issue.2
, pp. 51-57
-
-
Ghosh, A.K.1
Swaminatha, T.M.2
-
7
-
-
34248195511
-
The psychology of security
-
DOI 10.1145/1230819.1241693
-
Schneier B., The psychology of security Communications of the ACM 2007 50 5 128 (Pubitemid 46725670)
-
(2007)
Communications of the ACM
, vol.50
, Issue.5
, pp. 128
-
-
Schneier, B.1
-
8
-
-
84864939688
-
-
Mobile Phone Work Group Trusted Computing Group
-
Mobile Phone Work Group, Trusted Computing Group,. https://www. trustedcomputinggroup.org/groups/mobile
-
-
-
-
9
-
-
84864930766
-
-
Tcg Mobile Trusted Module Specification
-
TCG Mobile Trusted Module Specification, Revision 1. https://www. trustedcomputinggroup.org/specs/mobilephone/tcg-mobile-trustedmodule- 1.0.pdf
-
Revision 1
-
-
-
10
-
-
84864920947
-
Bioworks: A workflow system for automation of bioinformatics analysis processes
-
Han Y., Bioworks: a workflow system for automation of bioinformatics analysis processes International Journal of Bio-Science and Bio-Technology 2011 3 4 59 68
-
(2011)
International Journal of Bio-Science and Bio-Technology
, vol.3
, Issue.4
, pp. 59-68
-
-
Han, Y.1
-
12
-
-
77955748398
-
FingerprintIris fusion based identification system using a single hamming distance matcher
-
Baig A., Bouridane A., Kurugollu F., Qu G., FingerprintIris fusion based identification system using a single hamming distance matcher International Journal of Bio-Science and Bio-Technology 2009 1 1 46 58
-
(2009)
International Journal of Bio-Science and Bio-Technology
, vol.1
, Issue.1
, pp. 46-58
-
-
Baig, A.1
Bouridane, A.2
Kurugollu, F.3
Qu, G.4
-
13
-
-
79960724365
-
Privacy and legal requirements for developing biometric identification software in context-based applications
-
Pedraza J., Patricio M. A., de Ass A., Molina J. M., Privacy and legal requirements for developing biometric identification software in context-based applications International Journal of Bio-Science and Bio-Technology 2010 2 1 13 24
-
(2010)
International Journal of Bio-Science and Bio-Technology
, vol.2
, Issue.1
, pp. 13-24
-
-
Pedraza, J.1
Patricio, M.A.2
De Ass, A.3
Molina, J.M.4
-
16
-
-
33646778834
-
A wearable multi-sensor system for mobile acquisition of emotion-related physiological data
-
Tao J. Tan T. Picard R. W. Springer Lecture Notes in Computer Science
-
Peter C., Ebert E., Beikirch H., Tao J., Tan T., Picard R. W., A wearable multi-sensor system for mobile acquisition of emotion-related physiological data 3784 Proceedings of the 1st International Conference on Affective Computing and Intelligent Interaction (ACII '05) 2005 Springer 691 698 Lecture Notes in Computer Science
-
Proceedings of the 1st International Conference on Affective Computing and Intelligent Interaction (ACII '05) 2005
, vol.3784
, pp. 691-698
-
-
Peter, C.1
Ebert, E.2
Beikirch, H.3
-
19
-
-
33845395407
-
Side channel analysis for reverse engineering (SCARE)an improved attack against a secret A3/A8 GSM algorithm Cryptology ePrint Archive
-
2004/049
-
Clavier C., Side channel analysis for reverse engineering (SCARE)an improved attack against a secret A3/A8 GSM algorithm Cryptology ePrint Archive Report 2004 2004/049
-
(2004)
Report
-
-
Clavier, C.1
-
20
-
-
84864932198
-
-
Giesecke And Devrient Gmbh
-
Giesecke and devrient gmbh,. 2011, http://www.gi-de.com/
-
(2011)
-
-
|