-
1
-
-
84876748483
-
-
Amalfi Italy
-
Ateniese, G.; Cutmola, R.; de Meideiros, B.; Davis, D.; Medical Information Privacy Assurance: Cryptographic and System Aspects, Third Conference on Security in Communication Networks. Amalfi, Italy, pp. 199-218, 2002.
-
(2002)
Medical Information Privacy Assurance: Cryptographic and System Aspects, Third Conference on Security in Communication Networks
, pp. 199-218
-
-
Ateniese, G.1
Cutmola, R.2
De Meideiros, B.3
Davis, D.4
-
2
-
-
0347415586
-
Patient Privacy in Electronic Prescription Transfer
-
10.1109/MSECP.2003.1193217
-
Ball, E.; Chadwick, D. W.; Mundy, D.; Patient Privacy in Electronic Prescription Transfer. IEEE Security & Privacy Magazine 1(2):77-80, 2003.
-
(2003)
IEEE Security & Privacy Magazine
, vol.1
, Issue.2
, pp. 77-80
-
-
Ball, E.1
Chadwick, D.W.2
Mundy, D.3
-
3
-
-
85024290278
-
Group signatures
-
Springer-Verlag
-
Chaum, D.; Heyst, E. van, "Group signatures," In proceedings of Advances in Cryptology - Eurocrypt 1991, Vol. 547 of LNCS, pp. 257-265, Springer-Verlag, 1991.
-
(1991)
Proceedings of Advances in Cryptology - Eurocrypt 1991, Vol. 547 of LNCS
, pp. 257-265
-
-
Chaum, D.1
Heyst, E.2
-
4
-
-
0008898803
-
A Web-Enabled Framework for Smart Card Application in Health Services
-
10.1145/383694.383710
-
Chan, A. T. S.; Cao, J.; Chan, H.; Young, G.; A Web-Enabled Framework for Smart Card Application in Health Services. Communications of the ACM 44(9):77-82, 2001.
-
(2001)
Communications of the ACM
, vol.44
, Issue.9
, pp. 77-82
-
-
Chan, A.T.S.1
Cao, J.2
Chan, H.3
Young, G.4
-
5
-
-
63849310283
-
Group-based Authentication to Protect Digital Content for Business Applications", International Journal of Innovative Computing
-
Chen, C.-L.; Chen, Y.-Y.; Chen, Y.-H.; "Group-based Authentication to Protect Digital Content for Business Applications", International Journal of Innovative Computing. Information and Control 5(5):1243-1251, 2009.
-
(2009)
Information and Control
, vol.5
, Issue.5
, pp. 1243-1251
-
-
Chen, C.-L.1
Chen, Y.-Y.2
Chen, Y.-H.3
-
6
-
-
55949088433
-
A secure identity-based proxy multi-signature scheme
-
2473017 1156.94337 10.1016/j.ins.2008.05.039
-
Cao, F.; Cao, Z.; A secure identity-based proxy multi-signature scheme. Information Sciences 179(3):292-302, 2009.
-
(2009)
Information Sciences
, vol.179
, Issue.3
, pp. 292-302
-
-
Cao, F.1
Cao, Z.2
-
8
-
-
0032240478
-
SGML and XML as Interchange Formats for HL7 Messages
-
Dolin, R. H.; Rishel, W.; Biron, P. V.; Spinosa, J.; Mattison, J. E.; "SGML and XML as Interchange Formats for HL7 Messages," Journal of the American Medical Informatics Association, 720-724, 1998.
-
(1998)
Journal of the American Medical Informatics Association
, pp. 720-724
-
-
Dolin, R.H.1
Rishel, W.2
Biron, P.V.3
Spinosa, J.4
Mattison, J.E.5
-
9
-
-
0035183926
-
The HL7 Clinical Document Architecture
-
Dolin, R. H.; Alschuler, L.; Beebe, C.; Biron, P. V.; Boyer, S. L.; Essin, D.; Kimber, E.; Lincoln, T.; Mattison, J. E.; "The HL7 Clinical Document Architecture," Journal of the American Medical Informatics Association 8(6):552-569, 2001.
-
(2001)
Journal of the American Medical Informatics Association
, vol.8
, Issue.6
, pp. 552-569
-
-
Dolin, R.H.1
Alschuler, L.2
Beebe, C.3
Biron, P.V.4
Boyer, S.L.5
Essin, D.6
Kimber, E.7
Lincoln, T.8
Mattison, J.E.9
-
10
-
-
84874800178
-
A Public Key Cryptosystem and Signature Scheme based on Discrete Logarithms
-
798552 0571.94014 10.1109/TIT.1985.1057074
-
ElGamal, T.; A Public Key Cryptosystem and Signature Scheme based on Discrete Logarithms. IEEE Transactions on Information 31(4):469-472, 1985.
-
(1985)
IEEE Transactions on Information
, vol.31
, Issue.4
, pp. 469-472
-
-
Elgamal, T.1
-
12
-
-
25844502437
-
Technicl Guidelines for Enhancing Privacy and Data Protection in Modern Electronic Medical Environments
-
10.1109/TITB.2005.847498
-
Gritzalis, S.; Lambrinoudakis, C.; Lekkas, D.; Deftereos, S.; Technicl Guidelines for Enhancing Privacy and Data Protection in Modern Electronic Medical Environments. IEEE Transactions on Information Technology in Biomedicine 9(3):413-423, 2005.
-
(2005)
IEEE Transactions on Information Technology in Biomedicine
, vol.9
, Issue.3
, pp. 413-423
-
-
Gritzalis, S.1
Lambrinoudakis, C.2
Lekkas, D.3
Deftereos, S.4
-
13
-
-
0042834000
-
Security Issues for Implementation of E-Medical Records
-
Huston, T.; "Security Issues for Implementation of E-Medical Records," Communications of the ACM 44(9):89-94, 2001.
-
(2001)
Communications of the ACM
, vol.44
, Issue.9
, pp. 89-94
-
-
Huston, T.1
-
14
-
-
4944222766
-
A new hybrid case-based architecture for medical diagnosis
-
10.1016/j.ins.2003.11.009
-
Hsu, C.-C.; Ho, C.-S.; A new hybrid case-based architecture for medical diagnosis. Information Sciences 166(1-4):231-247, 2004.
-
(2004)
Information Sciences
, vol.166
, Issue.1-4
, pp. 231-247
-
-
Hsu, C.-C.1
Ho, C.-S.2
-
15
-
-
70349739583
-
Efficient threshold proxy signature protocol for mobile agents
-
10.1016/j.ins.2009.08.010
-
Hong, X.; Efficient threshold proxy signature protocol for mobile agents. Information Sciences 179(24):4243-4248, 2009.
-
(2009)
Information Sciences
, vol.179
, Issue.24
, pp. 4243-4248
-
-
Hong, X.1
-
16
-
-
77956062805
-
Application of portable CDA for secure clinical-document exchange
-
10.1007/s10916-009-9266-9
-
Huang, K.-H.; Hsieh, S.-H.; Chang, Y.-J.; Lai, F.; Hsieh, S.-L.; Lee, H.-H.; Application of portable CDA for secure clinical-document exchange. Journal of Medical Systems 34(4):531-539, 2010.
-
(2010)
Journal of Medical Systems
, vol.34
, Issue.4
, pp. 531-539
-
-
Huang, K.-H.1
Hsieh, S.-H.2
Chang, Y.-J.3
Lai, F.4
Hsieh, S.-L.5
Lee, H.-H.6
-
17
-
-
0037507593
-
Smart cards for the people
-
(1)
-
Jones, D.; "Smart cards for the people," Card Technology Today 15(3):16-16(1), 2003.
-
(2003)
Card Technology Today
, vol.15
, Issue.3
, pp. 16-16
-
-
Jones, D.1
-
18
-
-
77958593747
-
Activity-oriented access control to ubiquitous hospital information and services
-
10.1016/j.ins.2010.04.020
-
Le, X. H.; Lee, S.; Lee, Y.-K.; Lee, H.; Khalid, M.; Sankar, R.; Activity-oriented access control to ubiquitous hospital information and services. Information Sciences 180(16):2979-2990, 2010.
-
(2010)
Information Sciences
, vol.180
, Issue.16
, pp. 2979-2990
-
-
Le, X.H.1
Lee, S.2
Lee, Y.-K.3
Lee, H.4
Khalid, M.5
Sankar, R.6
-
19
-
-
0030231965
-
Proxy signatures: Delegation of the power to sign message
-
Mambo, M.; Usnda, K.; Okamoto, E.; "Proxy signatures: Delegation of the power to sign message". IEICE transactions on fundamentals of electronics, communications and computer sciences E79-A(9):1338-1354, 1996.
-
(1996)
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
, vol.79
, Issue.9
, pp. 1338-1354
-
-
Mambo, M.1
Usnda, K.2
Okamoto, E.3
-
21
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
700103 0368.94005 10.1145/359340.359342
-
Rivest, R. L.; Shamir, A.; Adleman, L.; A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21(2):120-126, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
25
-
-
0034317353
-
Architecture for networked electronic patient record systems
-
10.1016/S1386-5056(00)00116-7
-
Takeda, H.; Matsumura, Y.; Kuwata, S.; Architecture for networked electronic patient record systems. International Journal of Medical Informatics 60(2):161-167, 2000.
-
(2000)
International Journal of Medical Informatics
, vol.60
, Issue.2
, pp. 161-167
-
-
Takeda, H.1
Matsumura, Y.2
Kuwata, S.3
-
26
-
-
2342616187
-
Mining diagnostic rules from clinical databases using routh sets and medical diagnostic model
-
10.1016/j.ins.2004.03.002
-
Tsumoto, S.; Mining diagnostic rules from clinical databases using routh sets and medical diagnostic model. Information Sciences 162(2):65-80, 2004.
-
(2004)
Information Sciences
, vol.162
, Issue.2
, pp. 65-80
-
-
Tsumoto, S.1
-
27
-
-
27144495439
-
Development of an HL7 interface engine, based on tree structure and streaming algorithm, for large-size messages which include image data
-
10.1016/j.cmpb.2005.07.004
-
Um, K. S.; Kwak, Y. S.; Cho, H.; Kim, I. K.; Development of an HL7 interface engine, based on tree structure and streaming algorithm, for large-size messages which include image data. Computer Methods and Programs in Biomedicine 80:126-140, 2005.
-
(2005)
Computer Methods and Programs in Biomedicine
, vol.80
, pp. 126-140
-
-
Um, K.S.1
Kwak, Y.S.2
Cho, H.3
Kim, I.K.4
-
28
-
-
33144484852
-
Soft computing agents for e-Health in application to the research and control of unknown diseases
-
1092.68675 10.1016/j.ins.2005.07.020
-
Ulieru, M.; Hadzic, M.; Chang, E.; Soft computing agents for e-Health in application to the research and control of unknown diseases. Information Sciences 176(9):1190-1214, 2006.
-
(2006)
Information Sciences
, vol.176
, Issue.9
, pp. 1190-1214
-
-
Ulieru, M.1
Hadzic, M.2
Chang, E.3
-
29
-
-
79961170190
-
A Mechanism to Verify the Integrity of Computer-Based Patient Records
-
Wang, D.W.; Liu, D.R.; Chen, Y.C.; "A Mechanism to Verify the Integrity of Computer-Based Patient Records," The Journal of China Association for Medical Informatics 10:71-84, 1999.
-
(1999)
The Journal of China Association for Medical Informatics
, vol.10
, pp. 71-84
-
-
Wang, D.W.1
Liu, D.R.2
Chen, Y.C.3
-
30
-
-
1842483150
-
A Smart-Card-Enabled Privacy Preserving E-Prescription System
-
10.1109/TITB.2004.824731
-
Yang, Y.; Han, X.; Bao, F.; Deng, R. H.; A Smart-Card-Enabled Privacy Preserving E-Prescription System. IEEE Transactions on Information Technology in Biomedicine 8(1):47-58, 2004.
-
(2004)
IEEE Transactions on Information Technology in Biomedicine
, vol.8
, Issue.1
, pp. 47-58
-
-
Yang, Y.1
Han, X.2
Bao, F.3
Deng, R.H.4
-
31
-
-
33750945658
-
Ensuring Privacy for E-Health Services
-
Apr. 2006, Vienna University of Technology, Austria
-
Yee, G.; Korba, L.; Song, R.; "Ensuring Privacy for E-Health Services," In Proceedings of the First International Conference on Availability, Reliability and Security, pp. 20-22 Apr. 2006, Vienna University of Technology, Austria, 2006.
-
(2006)
Proceedings of the First International Conference on Availability, Reliability and Security
, pp. 20-22
-
-
Yee, G.1
Korba, L.2
Song, R.3
|