These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
133 related articles for article (PubMed ID: 16779087)
1. A secure protocol to distribute unlinkable health data. Malin BA; Sweeney L AMIA Annu Symp Proc; 2005; 2005():485-9. PubMed ID: 16779087 [TBL] [Abstract][Full Text] [Related]
2. Secure construction of k-unlinkable patient records from distributed providers. Malin B Artif Intell Med; 2010 Jan; 48(1):29-41. PubMed ID: 19875273 [TBL] [Abstract][Full Text] [Related]
3. A computational model to protect patient data from location-based re-identification. Malin B Artif Intell Med; 2007 Jul; 40(3):223-39. PubMed ID: 17544262 [TBL] [Abstract][Full Text] [Related]
4. How (not) to protect genomic data privacy in a distributed network: using trail re-identification to evaluate and design anonymity protection systems. Malin B; Sweeney L J Biomed Inform; 2004 Jun; 37(3):179-92. PubMed ID: 15196482 [TBL] [Abstract][Full Text] [Related]
5. A linkable identity privacy algorithm for HealthGrid. Zhang N; Rector A; Buchan I; Shi Q; Kalra D; Rogers J; Goble C; Walker S; Ingram D; Singleton P Stud Health Technol Inform; 2005; 112():234-45. PubMed ID: 15923732 [TBL] [Abstract][Full Text] [Related]
6. Security of medical multimedia. Tzelepi S; Pangalos G; Nikolacopoulou G Med Inform Internet Med; 2002 Sep; 27(3):169-84. PubMed ID: 12507263 [TBL] [Abstract][Full Text] [Related]
7. Data protection in networks. Rihaczek K Stud Health Technol Inform; 1991; 1():249-70. PubMed ID: 10164071 [TBL] [Abstract][Full Text] [Related]
8. Re-identification of familial database records. Malin B AMIA Annu Symp Proc; 2006; 2006():524-8. PubMed ID: 17238396 [TBL] [Abstract][Full Text] [Related]
9. A security architecture for health information networks. Kailar R; Muralidhar V AMIA Annu Symp Proc; 2007 Oct; 2007():379-83. PubMed ID: 18693862 [TBL] [Abstract][Full Text] [Related]
10. A patient privacy protection scheme for medical information system. Lu C; Wu Z; Liu M; Chen W; Guo J J Med Syst; 2013 Dec; 37(6):9982. PubMed ID: 24166018 [TBL] [Abstract][Full Text] [Related]
11. Patient privacy protection using anonymous access control techniques. Weerasinghe D; Rajarajan M; Elmufti K; Rakocevic V Methods Inf Med; 2008; 47(3):235-40. PubMed ID: 18473090 [TBL] [Abstract][Full Text] [Related]
12. Health care and privacy law in electronic commerce. Wright B Healthc Financ Manage; 1994 Jan; 48(1):66, 68-70. PubMed ID: 10145935 [TBL] [Abstract][Full Text] [Related]
13. Safe and secure. Interview by Bill Siwicki. Baker DB Health Data Manag; 1998 Aug; 6(8):32-4, 36. PubMed ID: 10181946 [No Abstract] [Full Text] [Related]
14. How secure is the Internet for healthcare applications? Campbell LA Radiol Manage; 1996; 18(1):28-32. PubMed ID: 10154332 [TBL] [Abstract][Full Text] [Related]
15. Privacy and security for electronic health records. Sharpe VA Hastings Cent Rep; 2005; 35(6):49. PubMed ID: 16396204 [No Abstract] [Full Text] [Related]
16. Security and privacy issues with health care information technology. Meingast M; Roosta T; Sastry S Conf Proc IEEE Eng Med Biol Soc; 2006; 2006():5453-8. PubMed ID: 17946702 [TBL] [Abstract][Full Text] [Related]
18. Who's looking at your files? Prying eyes find computerized health records an increasingly tempting target. Gorman C Time; 1996 May; 147(19):60-2. PubMed ID: 10157257 [No Abstract] [Full Text] [Related]
19. Privacy-Enhancing Li Y; Zhou F; Ge Y; Xu Z Sensors (Basel); 2021 Jun; 21(12):. PubMed ID: 34207856 [TBL] [Abstract][Full Text] [Related]
20. [A computerized system for the management of letters of authorization for access to sensitive data in a research and teaching hospital]. Bodina A; Brizzolara A; Vadruccio G; Castaldi S Ig Sanita Pubbl; 2012; 68(1):19-28. PubMed ID: 22507990 [TBL] [Abstract][Full Text] [Related] [Next] [New Search]