These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

126 related articles for article (PubMed ID: 11859535)

  • 1. Body of evidence.
    Hawkins D
    US News World Rep; 2002 Feb; 132(5):60-2. PubMed ID: 11859535
    [No Abstract]   [Full Text] [Related]  

  • 2. Getting personal. Biometric security devices gain access to health care facilities.
    Moss B
    Health Facil Manage; 2002 Sep; 15(9):20-4. PubMed ID: 12373934
    [No Abstract]   [Full Text] [Related]  

  • 3. Technology: biometric recognition.
    Jain AK
    Nature; 2007 Sep; 449(7158):38-40. PubMed ID: 17805286
    [No Abstract]   [Full Text] [Related]  

  • 4. Biometrics technology adds innovation to healthcare organization security systems.
    Perrin RA
    Healthc Financ Manage; 2002 Mar; 56(3):86-8. PubMed ID: 11899730
    [No Abstract]   [Full Text] [Related]  

  • 5. Believing in biometrics.
    Baldwin FD
    Healthc Inform; 2000 Aug; 17(8):37-8, 40, 42-4. PubMed ID: 11185138
    [No Abstract]   [Full Text] [Related]  

  • 6. What you know, what you have, what you are.
    McBride M
    Health Manag Technol; 2005 Dec; 26(12):10, 12, 14. PubMed ID: 16381115
    [No Abstract]   [Full Text] [Related]  

  • 7. Beyond fingerprinting.
    Jain AK; Pankanti S
    Sci Am; 2008 Sep; 299(3):78-81. PubMed ID: 18783055
    [No Abstract]   [Full Text] [Related]  

  • 8. And stay out! Hospitals have plenty of choices when it comes to access control technologies.
    Moss B
    Health Facil Manage; 2002 Apr; 15(4):26-9. PubMed ID: 11989121
    [No Abstract]   [Full Text] [Related]  

  • 9. One and done. The use of biometrics and authentication technologies can help healthcare organizations reduce workflow costs while safeguarding access to patient data.
    Kuperstein M
    Health Manag Technol; 2001 Dec; 22(12):22-3. PubMed ID: 11766428
    [No Abstract]   [Full Text] [Related]  

  • 10. Iris scanning: the eye of the storm. Several industries have hastened development of authentication technologies-including healthcare.
    Stumpf S
    Telemed Today; 2002; 9(3):27-8. PubMed ID: 12528482
    [No Abstract]   [Full Text] [Related]  

  • 11. How biometrics keep sensitive information secure.
    Walter CM
    Nursing; 2005 May; 35(5):76. PubMed ID: 15879983
    [No Abstract]   [Full Text] [Related]  

  • 12. Biometric identification. Ultrasonic systems can succeed where optical systems may not.
    Pierce FS
    Health Manag Technol; 2003 May; 24(5):38-9. PubMed ID: 12760092
    [No Abstract]   [Full Text] [Related]  

  • 13. Eyeing a new solution. Next generation of scanners offers security advances.
    Morrissey J
    Mod Healthc; 2002 Nov; 32(47):28. PubMed ID: 12510565
    [No Abstract]   [Full Text] [Related]  

  • 14. Electronic security systems monitor resident activity.
    Stern M
    Provider; 1991 Jan; 17(1):50-3. PubMed ID: 10108565
    [No Abstract]   [Full Text] [Related]  

  • 15. "Don't I know you? I'd recognize that fingerprint anywhere".
    Keener RE
    Health Manag Technol; 1999 Aug; 20(7):8-9. PubMed ID: 10620995
    [No Abstract]   [Full Text] [Related]  

  • 16. Biometrics: can we have a show of hands?
    Briggs B
    Health Data Manag; 2002 Dec; 10(12):48-50, 52. PubMed ID: 12528643
    [No Abstract]   [Full Text] [Related]  

  • 17. Access denied. Mayo Clinic is a believer in using biometrics to protect medical data, but technological flaws shut doctors out, shut system down.
    Morrissey J
    Mod Healthc; 2002 Nov; 32(47):22-4, 26, 30. PubMed ID: 12510564
    [No Abstract]   [Full Text] [Related]  

  • 18. Biometric scanning, law & policy: identifying the concerns--drafting the biometric blueprint.
    Woodward JD
    Univ Pittsbg Law Rev; 1997; 59(1):97-155. PubMed ID: 14631989
    [No Abstract]   [Full Text] [Related]  

  • 19. A new method for generating an invariant iris private key based on the fuzzy vault system.
    Lee YJ; Park KR; Lee SJ; Bae K; Kim J
    IEEE Trans Syst Man Cybern B Cybern; 2008 Oct; 38(5):1302-13. PubMed ID: 18784013
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Continuous verification using multimodal biometrics.
    Sim T; Zhang S; Janakiraman R; Kumar S
    IEEE Trans Pattern Anal Mach Intell; 2007 Apr; 29(4):687-700. PubMed ID: 17299225
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 7.