BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

363 related articles for article (PubMed ID: 10179709)

  • 1. Security of medical image databases.
    Tzelepi S; Pangalos G; Khair M
    Stud Health Technol Inform; 1997; 43 Pt B():470-4. PubMed ID: 10179709
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Security of medical multimedia.
    Tzelepi S; Pangalos G; Nikolacopoulou G
    Med Inform Internet Med; 2002 Sep; 27(3):169-84. PubMed ID: 12507263
    [TBL] [Abstract][Full Text] [Related]  

  • 3. A review of content-based image retrieval systems in medical applications-clinical benefits and future directions.
    Müller H; Michoux N; Bandon D; Geissbuhler A
    Int J Med Inform; 2004 Feb; 73(1):1-23. PubMed ID: 15036075
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Medical network security and viruses.
    Fernandez Del Val C
    Stud Health Technol Inform; 1991; 1():271-84. PubMed ID: 10164072
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Telemedicine and security. Confidentiality, integrity, and availability: a Canadian perspective.
    Jennett P; Watanabe M; Igras E; Premkumar K; Hall W
    Stud Health Technol Inform; 1996; 29():286-98. PubMed ID: 10163762
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Context-aware access control for pervasive access to process-based healthcare systems.
    Koufi V; Vassilacopoulos G
    Stud Health Technol Inform; 2008; 136():679-84. PubMed ID: 18487810
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Authentication and authorisation prototype on the mu grid for medical data management.
    Seitz L; Montagnat J; Pierson JM; Oriol D; Lingrand D
    Stud Health Technol Inform; 2005; 112():222-33. PubMed ID: 15923731
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Analysis of security problems in a medical image encryption system.
    Alvarez G; Li S; Hernandez L
    Comput Biol Med; 2007 Mar; 37(3):424-7. PubMed ID: 16872592
    [TBL] [Abstract][Full Text] [Related]  

  • 9. An integrated multimedia medical information network system.
    Yamamoto K; Makino J; Sasagawa N; Nagira M
    Stud Health Technol Inform; 1998; 52 Pt 1():193-6. PubMed ID: 10384445
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Draft secure medical database standard.
    Pangalos G
    Stud Health Technol Inform; 2002; 69():49-110; discussion 229-37. PubMed ID: 15458163
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Web distribution of diagnostic images requires new security efforts.
    Keese JM; Johnson G
    Radiol Manage; 2002; 24(1):40-1. PubMed ID: 11857995
    [No Abstract]   [Full Text] [Related]  

  • 12. Watermarking medical images with anonymous patient identification to verify authenticity.
    Coatrieux G; Quantin C; Montagner J; Fassa M; Allaert FA; Roux C
    Stud Health Technol Inform; 2008; 136():667-72. PubMed ID: 18487808
    [TBL] [Abstract][Full Text] [Related]  

  • 13. A computer science approach to managing security in health care.
    Asirelli P; Braccini G; Caramella D; Coco A; Fabbrini F
    Radiol Med; 2002 Sep; 104(3):203-12. PubMed ID: 12471368
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Image and report distribution on the Internet.
    Allen ML
    Radiol Manage; 1996; 18(3):25-32. PubMed ID: 10158367
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Issues of security and network security in Health Care Information Systems.
    Patel A; Kantzavelou I
    Stud Health Technol Inform; 1996; 27():216-23. PubMed ID: 10163736
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Using software agents to preserve individual health data confidentiality in micro-scale geographical analyses.
    Kamel Boulos MN; Cai Q; Padget JA; Rushton G
    J Biomed Inform; 2006 Apr; 39(2):160-70. PubMed ID: 16098819
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Privacy and security in teleradiology.
    Ruotsalainen P
    Eur J Radiol; 2010 Jan; 73(1):31-5. PubMed ID: 19914020
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Formal policies for flexible EHR security.
    Blobel B; Pharow P
    Stud Health Technol Inform; 2006; 121():307-16. PubMed ID: 17095829
    [TBL] [Abstract][Full Text] [Related]  

  • 19. RESHEN, a best practice approach for secure healthcare networks in Europe.
    Georgoulas A; Bourka A; Kaliontzoglou A; Polemi N; Koutsouris D
    Stud Health Technol Inform; 2003; 96():51-9. PubMed ID: 15061524
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Health care and privacy law in electronic commerce.
    Wright B
    Healthc Financ Manage; 1994 Jan; 48(1):66, 68-70. PubMed ID: 10145935
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 19.