BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

531 related articles for article (PubMed ID: 18487808)

  • 1. Watermarking medical images with anonymous patient identification to verify authenticity.
    Coatrieux G; Quantin C; Montagner J; Fassa M; Allaert FA; Roux C
    Stud Health Technol Inform; 2008; 136():667-72. PubMed ID: 18487808
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Watermarking - a new way to bring evidence in case of telemedicine litigation.
    Coatrieux G; Quantin C; Allaert FA; Auverlot B; Roux C
    Stud Health Technol Inform; 2011; 169():611-5. PubMed ID: 21893821
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Privacy preservation and information security protection for patients' portable electronic health records.
    Huang LC; Chu HC; Lien CY; Hsiao CH; Kao T
    Comput Biol Med; 2009 Sep; 39(9):743-50. PubMed ID: 19589509
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Proposal of a French health identification number interoperable at the European level.
    Quantin C; Allaert FA; Avillach P; Riandey B; Fieschi M; Fassa M; Cohen O
    Stud Health Technol Inform; 2007; 129(Pt 1):503-7. PubMed ID: 17911768
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Three computational systems for disclosing medical data in the year 1999.
    Sweeney L
    Stud Health Technol Inform; 1998; 52 Pt 2():1124-9. PubMed ID: 10384634
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Providing integrity and authenticity in DICOM images: a novel approach.
    Kobayashi LO; Furuie SS; Barreto PS
    IEEE Trans Inf Technol Biomed; 2009 Jul; 13(4):582-9. PubMed ID: 19244022
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Privacy protections afforded by computer-based patient record systems.
    Amatayakul M
    Top Health Inf Manage; 1996 May; 16(4):22-7. PubMed ID: 10157658
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Image integrity verification in medical information systems.
    Lenti J; Lovanyi I
    Stud Health Technol Inform; 2003; 95():286-91. PubMed ID: 14664001
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Fingerprint verification on medical image reporting system.
    Chen YC; Chen LK; Tsai MD; Chiu HC; Chiu JS; Chong CF
    Comput Methods Programs Biomed; 2008 Mar; 89(3):282-8. PubMed ID: 18178287
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Improving outcomes with interoperable EHRs and secure global health information infrastructure.
    Kun L; Coatrieux G; Quantin C; Beuscart R; Mathews R
    Stud Health Technol Inform; 2008; 137():68-79. PubMed ID: 18560070
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Giving patients secure << Google-like >> access to their medical record.
    Quantin C; Fassa M; Coatrieux G; Breton V; Boire JY; Allaert FA
    Stud Health Technol Inform; 2008; 137():61-7. PubMed ID: 18560069
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Confidentiality preserving audits of electronic medical record access.
    Malin B; Airoldi E
    Stud Health Technol Inform; 2007; 129(Pt 1):320-4. PubMed ID: 17911731
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Privacy and efficiency in patients focused health care processes.
    Morger O; Nitsche U; Teufel S
    Stud Health Technol Inform; 1998; 52 Pt 2():1143-7. PubMed ID: 10384638
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Security of medical image databases.
    Tzelepi S; Pangalos G; Khair M
    Stud Health Technol Inform; 1997; 43 Pt B():470-4. PubMed ID: 10179709
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Legal issues of the electronic dental record: security and confidentiality.
    Szekely DG; Milam S; Khademi JA
    J Dent Educ; 1996 Jan; 60(1):19-23. PubMed ID: 8594098
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Towards dynamic access control for healthcare information systems.
    Røstad L; Nytrø O
    Stud Health Technol Inform; 2008; 136():703-8. PubMed ID: 18487814
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Knowledge management for the protection of information in electronic medical records.
    Lea N; Hailes S; Austin T; Kalra D
    Stud Health Technol Inform; 2008; 136():685-90. PubMed ID: 18487811
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Analysis of security problems in a medical image encryption system.
    Alvarez G; Li S; Hernandez L
    Comput Biol Med; 2007 Mar; 37(3):424-7. PubMed ID: 16872592
    [TBL] [Abstract][Full Text] [Related]  

  • 19. A computational model to protect patient data from location-based re-identification.
    Malin B
    Artif Intell Med; 2007 Jul; 40(3):223-39. PubMed ID: 17544262
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Simultaneous storage of patient information with medical images in the frequency domain.
    Acharya R; Niranjan UC; Iyengar SS; Kannathal N; Min LC
    Comput Methods Programs Biomed; 2004 Oct; 76(1):13-9. PubMed ID: 15313538
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 27.