These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

94 related articles for article (PubMed ID: 12528482)

  • 21. Security HotList.
    Health Manag Technol; 2000 Dec; 21(12):54-6. PubMed ID: 11147503
    [No Abstract]   [Full Text] [Related]  

  • 22. Realization of a universal patient identifier for electronic medical records through biometric technology.
    Leonard DC; Pons AP; Asfour SS
    IEEE Trans Inf Technol Biomed; 2009 Jul; 13(4):494-500. PubMed ID: 19273015
    [TBL] [Abstract][Full Text] [Related]  

  • 23. Touching the future. New technologies bolster existing security systems.
    Hodgson K
    Health Facil Manage; 2003 Jul; 16(7):14-9. PubMed ID: 12894665
    [No Abstract]   [Full Text] [Related]  

  • 24. Rx for password headaches. Biometric authentication solution lets physicians be their passwords.
    Peck B
    Health Manag Technol; 2003 Jan; 24(1):50-2. PubMed ID: 12564143
    [No Abstract]   [Full Text] [Related]  

  • 25. Security measures protect integrity of Shared Visions-New Pathways system.
    Jt Comm Perspect; 2004 Jan; 24(1):23. PubMed ID: 14746100
    [No Abstract]   [Full Text] [Related]  

  • 26. Biometrics offers alternative to password entry.
    Thompson CA
    Am J Health Syst Pharm; 2005 Jun; 62(11):1115-6. PubMed ID: 15914868
    [No Abstract]   [Full Text] [Related]  

  • 27. Security of medical data transfer and storage in Internet. Cryptography, antiviral security and electronic signature problems, which must be solved in nearest future in practical context.
    Kasztelowicz P; Czubenko M; Zieba I
    Pol J Pathol; 2003; 54(3):209-14. PubMed ID: 14703290
    [TBL] [Abstract][Full Text] [Related]  

  • 28. Biometric and single-sign-on technologies cure the passwords 'haddock'.
    Siwicki B
    Health Data Manag; 2004 Sep; 12(9):8. PubMed ID: 15568573
    [No Abstract]   [Full Text] [Related]  

  • 29. Ethical and social implications of biometric identification technology.
    Mordini E; Petrini C
    Ann Ist Super Sanita; 2007; 43(1):5-11. PubMed ID: 17536148
    [TBL] [Abstract][Full Text] [Related]  

  • 30. Two technologies let hospitals pass on words.
    Briggs B
    Health Data Manag; 2004 Sep; 12(9):34-6, 38, 40 passim. PubMed ID: 15568574
    [No Abstract]   [Full Text] [Related]  

  • 31. The bioethics of security. Editorial.
    Williams R; Barr M; Haimes E
    Bioethics; 2008 Nov; 22(9):ii-iii. PubMed ID: 18959727
    [No Abstract]   [Full Text] [Related]  

  • 32. Biometric identification. Ultrasonic systems can succeed where optical systems may not.
    Pierce FS
    Health Manag Technol; 2003 May; 24(5):38-9. PubMed ID: 12760092
    [No Abstract]   [Full Text] [Related]  

  • 33. Body identification, biometrics and medicine: ethical and social considerations.
    Mordini E; Ottolini C
    Ann Ist Super Sanita; 2007; 43(1):51-60. PubMed ID: 17536154
    [TBL] [Abstract][Full Text] [Related]  

  • 34. The keys to identity.
    Reynolds P
    Health Manag Technol; 2004 Dec; 25(12):12-4, 16. PubMed ID: 15612302
    [No Abstract]   [Full Text] [Related]  

  • 35. A new method for generating an invariant iris private key based on the fuzzy vault system.
    Lee YJ; Park KR; Lee SJ; Bae K; Kim J
    IEEE Trans Syst Man Cybern B Cybern; 2008 Oct; 38(5):1302-13. PubMed ID: 18784013
    [TBL] [Abstract][Full Text] [Related]  

  • 36. The best bits in an iris code.
    Hollingsworth KP; Bowyer KW; Flynn PJ
    IEEE Trans Pattern Anal Mach Intell; 2009 Jun; 31(6):964-73. PubMed ID: 19372603
    [TBL] [Abstract][Full Text] [Related]  

  • 37. Who are you? Plucked from science fiction, palm-vein patient authentication is a cutting-edge technology that can yield major cost avoidance.
    Lawrence D
    Healthc Inform; 2009 Mar; 26(3):32, 34-5. PubMed ID: 19358429
    [TBL] [Abstract][Full Text] [Related]  

  • 38. The role of physical security in the information security world.
    Carey J
    J Healthc Prot Manage; 2003; 19(2):1-13. PubMed ID: 12921010
    [TBL] [Abstract][Full Text] [Related]  

  • 39. The newest frontier: ethical landscapes in electronic healthcare.
    Bauer KA
    Camb Q Healthc Ethics; 2008; 17(4):358-9. PubMed ID: 18724876
    [No Abstract]   [Full Text] [Related]  

  • 40. EMR confidentiality and information security.
    Kurtz G
    J Healthc Inf Manag; 2003; 17(3):41-8. PubMed ID: 12858596
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 5.