BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

99 related articles for article (PubMed ID: 18066366)

  • 1. How secure is your information system? An investigation into actual healthcare worker password practices.
    Cazier JA; Medlin BD
    Perspect Health Inf Manag; 2006 Sep; 3():8. PubMed ID: 18066366
    [TBL] [Abstract][Full Text] [Related]  

  • 2. "Passwords protect my stuff"-a study of children's password practices.
    Choong YY; Theofanos MF; Renaud K; Prior S
    J Cybersecur; 2019; 5(1):. PubMed ID: 33042580
    [TBL] [Abstract][Full Text] [Related]  

  • 3. How strong are passwords used to protect personal health information in clinical trials?
    El Emam K; Moreau K; Jonker E
    J Med Internet Res; 2011 Feb; 13(1):e18. PubMed ID: 21317106
    [TBL] [Abstract][Full Text] [Related]  

  • 4. LPG-PCFG: An Improved Probabilistic Context- Free Grammar to Hit Low-Probability Passwords.
    Guo X; Tan K; Liu Y; Jin M; Lu H
    Sensors (Basel); 2022 Jun; 22(12):. PubMed ID: 35746386
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Recurrent GANs Password Cracker For IoT Password Security Enhancement.
    Nam S; Jeon S; Kim H; Moon J
    Sensors (Basel); 2020 May; 20(11):. PubMed ID: 32486361
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Siamese Neural Network for Keystroke Dynamics-Based Authentication on Partial Passwords.
    Lis K; Niewiadomska-Szynkiewicz E; Dziewulska K
    Sensors (Basel); 2023 Jul; 23(15):. PubMed ID: 37571467
    [TBL] [Abstract][Full Text] [Related]  

  • 7. A Password Meter without Password Exposure.
    Kim P; Lee Y; Hong YS; Kwon T
    Sensors (Basel); 2021 Jan; 21(2):. PubMed ID: 33419094
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Cognitive CAPTCHA Password Reminder.
    Krzyworzeka N; Ogiela L; Ogiela MR
    Sensors (Basel); 2023 Mar; 23(6):. PubMed ID: 36991880
    [TBL] [Abstract][Full Text] [Related]  

  • 9. [Application of password manager software in health care].
    Ködmön J
    Orv Hetil; 2016 Dec; 157(52):2066-2073. PubMed ID: 28019111
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Secure and Efficient Two-Factor User Authentication Scheme with User Anonymity for Network Based E-Health Care Applications.
    Li X; Niu J; Karuppiah M; Kumari S; Wu F
    J Med Syst; 2016 Dec; 40(12):268. PubMed ID: 27734256
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Secure access to patient's health records using SpeechXRays a mutli-channel biometrics platform for user authentication.
    Spanakis EG; Spanakis M; Karantanas A; Marias K
    Annu Int Conf IEEE Eng Med Biol Soc; 2016 Aug; 2016():2541-2544. PubMed ID: 28268840
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Readiness for Health Information Technology is Associated to Information Security in Healthcare Institutions.
    Dönmez E; Kitapçı NŞ; Kitapçı OC; Yay M; Aksu PK; Köksal L; Mumcu G
    Acta Inform Med; 2020 Dec; 28(4):265-271. PubMed ID: 33627928
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Prevalence of Sharing Access Credentials in Electronic Medical Records.
    Hassidim A; Korach T; Shreberk-Hassidim R; Thomaidou E; Uzefovsky F; Ayal S; Ariely D
    Healthc Inform Res; 2017 Jul; 23(3):176-182. PubMed ID: 28875052
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Security analysis and improvements to the PsychoPass method.
    Brumen B; Heričko M; Rozman I; Hölbl M
    J Med Internet Res; 2013 Aug; 15(8):e161. PubMed ID: 23942458
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Detection of DIAG and LINE Patterns in PassPoints Graphical Passwords Based on the Maximum Angles of Their Delaunay Triangles.
    Suárez-Plasencia L; Herrera-Macías JA; Legón-Pérez CM; Sosa-Gómez G; Rojas O
    Sensors (Basel); 2022 Mar; 22(5):. PubMed ID: 35271135
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Improving computer security for authentication of users: influence of proactive password restrictions.
    Proctor RW; Lien MC; Vu KP; Schultz EE; Salvendy G
    Behav Res Methods Instrum Comput; 2002 May; 34(2):163-9. PubMed ID: 12109007
    [TBL] [Abstract][Full Text] [Related]  

  • 17. A secure and robust password-based remote user authentication scheme using smart cards for the integrated EPR information system.
    Das AK
    J Med Syst; 2015 Mar; 39(3):25. PubMed ID: 25666924
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Preventing shoulder-surfing attack with the concept of concealing the password objects' information.
    Ho PF; Kam YH; Wee MC; Chong YN; Por LY
    ScientificWorldJournal; 2014; 2014():838623. PubMed ID: 24991649
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Technical solutions for mitigating security threats caused by health professionals in clinical settings.
    Fernandez-Aleman JL; Belen Sanchez Garcia A; Garcia-Mateos G; Toval A
    Annu Int Conf IEEE Eng Med Biol Soc; 2015 Aug; 2015():1389-92. PubMed ID: 26736528
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Individual differences in cyber security behaviors: an examination of who is sharing passwords.
    Whitty M; Doodson J; Creese S; Hodges D
    Cyberpsychol Behav Soc Netw; 2015 Jan; 18(1):3-7. PubMed ID: 25517697
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 5.