-
1
-
-
0031412049
-
Developing a secure healthcare information network on the internet
-
Calcote, S., Developing a secure healthcare information network on the internet. Healthcare Financial Management 51(1):68-70, 1997.
-
(1997)
Healthcare Financial Management
, vol.51
, Issue.1
, pp. 68-70
-
-
Calcote, S.1
-
2
-
-
84864072885
-
The importance of telecare for people with dementia
-
Buckley, J., The importance of telecare for people with dementia. Nursing & Residential Care 8(5):212-214, 2006.
-
(2006)
Nursing & Residential Care
, vol.8
, Issue.5
, pp. 212-214
-
-
Buckley, J.1
-
3
-
-
0035226709
-
A preliminary study of the feasibility of wound telecare for the elderly
-
10.1258/1357633011937001
-
Debray, M., Couturier, P., Greuillet, F., Hohn, C., Banerjee, S., Gavazzi, G., and Franco, A., A preliminary study of the feasibility of wound telecare for the elderly. Journal of Telemedicine and Telecare 7(6):353-358, 2001.
-
(2001)
Journal of Telemedicine and Telecare
, vol.7
, Issue.6
, pp. 353-358
-
-
Debray, M.1
Couturier, P.2
Greuillet, F.3
Hohn, C.4
Banerjee, S.5
Gavazzi, G.6
Franco, A.7
-
4
-
-
61849161109
-
Design Evaluation of a Home-Based Telecare System for Chronic Heart Failure Patients
-
Gund, A., Ekman, I., Lindecrantz, K., Sjoqvist, B. A., Staaf, E. L., Thorneskold, N., "Design Evaluation of a Home-Based Telecare System for Chronic Heart Failure Patients", the 30th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, pp. 5851-5854, 2008.
-
(2008)
30th Annual International Conference of the IEEE Engineering in Medicine and Biology Society
, pp. 5851-5854
-
-
Gund, A.1
Ekman, I.2
Lindecrantz, K.3
Sjoqvist, B.A.4
Staaf, E.L.5
Thorneskold, N.6
-
5
-
-
0344875485
-
Real-time multimedia applications in a web-based robotic telecare system
-
10.1023/A:1027367715148
-
Hou, C., Jia, S. M., and Takase, K., Real-time multimedia applications in a web-based robotic telecare system. Journal of Intelligent & Robotic Systems 38(2):135-153, 2003.
-
(2003)
Journal of Intelligent & Robotic Systems
, vol.38
, Issue.2
, pp. 135-153
-
-
Hou, C.1
Jia, S.M.2
Takase, K.3
-
6
-
-
18744363342
-
A novel key management scheme for dynamic access control in a user hierarchy
-
Chen, T. S., Chung, Y. F., and Tian, C. S., A novel key management scheme for dynamic access control in a user hierarchy. Proceedings of the IEEE Annual International Computer Software and Applications Conference 1:396-401, 2004.
-
(2004)
Proceedings of the IEEE Annual International Computer Software and Applications Conference
, vol.1
, pp. 396-401
-
-
Chen, T.S.1
Chung, Y.F.2
Tian, C.S.3
-
7
-
-
23944459002
-
Classification of Malicious Host Threats in Mobile Agent Computing
-
Bierman, E., Pretoria, T., Cloete, E., "Classification of Malicious Host Threats in Mobile Agent Computing," Proceedings of the 2002 Annual Research Conference of The South African Institute of Computer Scientists and Information Technologists on Enablement Through Technology, pp. 141-148, 2002.
-
(2002)
Proceedings of the 2002 Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists on Enablement Through Technology
, pp. 141-148
-
-
Bierman, E.1
Pretoria, T.2
Cloete, E.3
-
8
-
-
84964820465
-
Security Issues in Mobile Agent Technology
-
Cape Town, South Africa
-
Corradi, A., Montanari, R., Stefanelli, C., "Security Issues in Mobile Agent Technology," Proceedings of the 7th IEEE Workshop on Future Trends of Distributed Computing System, pp. 3-8, Cape Town, South Africa, 1999.
-
(1999)
Proceedings of the 7th IEEE Workshop on Future Trends of Distributed Computing System
, pp. 3-8
-
-
Corradi, A.1
Montanari, R.2
Stefanelli, C.3
-
9
-
-
0033702826
-
A Security Architecture for Mobile Agents in Ajanta
-
Taipei, Taiwan
-
Karnik, N. M., Tripathi, A. R., "A Security Architecture for Mobile Agents in Ajanta," Proceedings of the International Conference on Distributed Computing Systems, pp. 402-409, Taipei, Taiwan, 2000.
-
(2000)
Proceedings of the International Conference on Distributed Computing Systems
, pp. 402-409
-
-
Karnik, N.M.1
Tripathi, A.R.2
-
10
-
-
0032121340
-
Access control and key management for mobile agents
-
10.1016/S0097-8493(98)00035-1
-
Volker, R., and Mehrdad, J. S., Access control and key management for mobile agents. Computer and Graphics 22(4):457-461, 1998.
-
(1998)
Computer and Graphics
, vol.22
, Issue.4
, pp. 457-461
-
-
Volker, R.1
Mehrdad, J.S.2
-
11
-
-
84877584339
-
The State of HIPAA Privacy and Security Compliance
-
April
-
"The State of HIPAA Privacy and Security Compliance", AHIMA, April 2006.
-
(2006)
AHIMA
-
-
-
12
-
-
0029298494
-
Protection of confidentiality in the computer-based patient record
-
Safran, C., Rind, D., Citroen, M., Bakker, A. R., Slack, W. V., and Bleich, H. L., Protection of confidentiality in the computer-based patient record. MD Computing 12(3):187-192, 1995.
-
(1995)
MD Computing
, vol.12
, Issue.3
, pp. 187-192
-
-
Safran, C.1
Rind, D.2
Citroen, M.3
Bakker, A.R.4
Slack, W.V.5
Bleich, H.L.6
-
13
-
-
57349200762
-
Privacy, confidentiality, and electronic medical records
-
10.1136/jamia.1996.96236282
-
Barrows, R. C., Jr., and Clayton, P. D., Privacy, confidentiality, and electronic medical records. Journal of the American Medical Informatics Association 3(2):139-148, 1996.
-
(1996)
Journal of the American Medical Informatics Association
, vol.3
, Issue.2
, pp. 139-148
-
-
Barrows, Jr.R.C.1
Clayton, P.D.2
-
14
-
-
0036804023
-
Mobile agent security, electronics and communication
-
October
-
Borselius, N., Mobile agent security, electronics and communication. Engineering Journal 14(5):211-218, October 2002.
-
(2002)
Engineering Journal
, vol.14
, Issue.5
, pp. 211-218
-
-
Borselius, N.1
-
15
-
-
0043139094
-
Agents that buy and sell
-
10.1145/295685.295716
-
Maes, P., Guttman, R. H., and Moukas, A. G., Agents that buy and sell. Communications of the ACM 42(3):81-91, 1999.
-
(1999)
Communications of the ACM
, vol.42
, Issue.3
, pp. 81-91
-
-
Maes, P.1
Guttman, R.H.2
Moukas, A.G.3
-
16
-
-
0010227312
-
Complexity of a determinate algorithm for the discrete logarithm
-
1275323 10.1007/BF02113297
-
Nechaev, V. I., Complexity of a determinate algorithm for the discrete logarithm. Mathematical Notes 55:165-172, 1994.
-
(1994)
Mathematical Notes
, vol.55
, pp. 165-172
-
-
Nechaev, V.I.1
-
18
-
-
67650299196
-
E-health Services with Secure Mobile Agent
-
Sulaiman, R., Huang, X., Sharma, D., "E-health Services with Secure Mobile Agent," Proceedings of the 2009 Seventh Annual Communication Networks and Services Research Conference, pp. 270-277, 2009.
-
(2009)
Proceedings of the 2009 Seventh Annual Communication Networks and Services Research Conference
, pp. 270-277
-
-
Sulaiman, R.1
Huang, X.2
Sharma, D.3
-
19
-
-
70449553747
-
Providing QoS Support for Wireless Remote Healthcare System
-
Jiang, S., Xue, Y., Giani, A., Bajcsy, R., "Providing QoS Support for Wireless Remote Healthcare System," International Conference on Multimedia and Expo, pp. 1692-1695, 2009.
-
(2009)
International Conference on Multimedia and Expo
, pp. 1692-1695
-
-
Jiang, S.1
Xue, Y.2
Giani, A.3
Bajcsy, R.4
-
21
-
-
34249997329
-
Mobile information and communication in the hospital outpatient service
-
10.1016/j.ijmedinf.2006.04.008
-
Jen, W., Chao, C., Hung, M., Li, Y., and Chi, Y., Mobile information and communication in the hospital outpatient service. International Journal of Medical Informatics 76:565-574, 2007.
-
(2007)
International Journal of Medical Informatics
, vol.76
, pp. 565-574
-
-
Jen, W.1
Chao, C.2
Hung, M.3
Li, Y.4
Chi, Y.5
-
22
-
-
79953060157
-
-
Kluwer Academic Publishers
-
Markovic, M., Savic, Z., Kovacevic, B., "Secure Mobile Health Systems: Principles and Solutions, M-Health: Emerging Mobile Health Systems," Kluwer Academic Publishers, pp. 81-106, 2007.
-
(2007)
Secure Mobile Health Systems: Principles and Solutions, M-Health: Emerging Mobile Health Systems
, pp. 81-106
-
-
Markovic, M.1
Savic, Z.2
Kovacevic, B.3
|