These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

30 related articles for article (PubMed ID: 11604930)

  • 1. Secure and Usable Enterprise Authentication:: Lessons from the Field.
    Theofanos M; Garfinkel S; Choong YY
    IEEE Secur Priv; 2016; 14(5):. PubMed ID: 38495776
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Design and implementation of a smart card based healthcare information system.
    Kardas G; Tunali ET
    Comput Methods Programs Biomed; 2006 Jan; 81(1):66-78. PubMed ID: 16356586
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Improving computer security by health smart card.
    Nisand G; Allaert FA; Brézillon R; Isphording W; Roeslin N
    Stud Health Technol Inform; 2003; 95():176-81. PubMed ID: 14663983
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Security and confidentiality of health information systems: implications for physicians.
    Dorodny VS
    Physician Exec; 1998; 24(3):32-7. PubMed ID: 10180971
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Secure interoperability of patient data cards in health networks.
    Blobel B; Spiegel V; Pharow P; Engel K; Engelbrecht R
    Stud Health Technol Inform; 2000; 77():1059-68. PubMed ID: 11187483
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Design and Analysis of an Enhanced Patient-Server Mutual Authentication Protocol for Telecare Medical Information System.
    Amin R; Islam SK; Biswas GP; Khan MK; Obaidat MS
    J Med Syst; 2015 Nov; 39(11):137. PubMed ID: 26324169
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Towards second-generation smart card-based authentication in health information systems: the secure server model.
    Hallberg J; Hallberg N; Timpka T
    Stud Health Technol Inform; 2001; 84(Pt 2):1257-61. PubMed ID: 11604930
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Investigating risk exposure in e-health systems.
    Croll PR; Croll J
    Int J Med Inform; 2007; 76(5-6):460-5. PubMed ID: 17126069
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Web-based secure access from multiple patient repositories.
    Choe J; Yoo SK
    Int J Med Inform; 2008 Apr; 77(4):242-8. PubMed ID: 17681878
    [TBL] [Abstract][Full Text] [Related]  

  • 10. The challenge for security and privacy services in distributed health settings.
    Katsikas S; Lopez J; Pernul G
    Stud Health Technol Inform; 2008; 134():113-25. PubMed ID: 18376039
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Comparing approaches for advanced e-health security infrastructures.
    Blobel B
    Int J Med Inform; 2007; 76(5-6):454-9. PubMed ID: 17074532
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Secure e-Health: managing risks to patient health data.
    Kluge EH
    Int J Med Inform; 2007; 76(5-6):402-6. PubMed ID: 17084665
    [TBL] [Abstract][Full Text] [Related]  

  • 13.
    ; ; . PubMed ID:
    [No Abstract]   [Full Text] [Related]  

  • 14.
    ; ; . PubMed ID:
    [No Abstract]   [Full Text] [Related]  

  • 15.
    ; ; . PubMed ID:
    [No Abstract]   [Full Text] [Related]  

  • 16.
    ; ; . PubMed ID:
    [No Abstract]   [Full Text] [Related]  

  • 17.
    ; ; . PubMed ID:
    [No Abstract]   [Full Text] [Related]  

  • 18.
    ; ; . PubMed ID:
    [No Abstract]   [Full Text] [Related]  

  • 19.
    ; ; . PubMed ID:
    [No Abstract]   [Full Text] [Related]  

  • 20.
    ; ; . PubMed ID:
    [No Abstract]   [Full Text] [Related]  

    [Next]    [New Search]
    of 2.