These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

120 related articles for article (PubMed ID: 19789117)

  • 1. IBE-Lite: a lightweight identity-based cryptography for body sensor networks.
    Tan CC; Wang H; Zhong S; Li Q
    IEEE Trans Inf Technol Biomed; 2009 Nov; 13(6):926-32. PubMed ID: 19789117
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Using the timing information of heartbeats as an entity identifier to secure body sensor network.
    Bao SD; Poon CC; Zhang YT; Shen LF
    IEEE Trans Inf Technol Biomed; 2008 Nov; 12(6):772-9. PubMed ID: 19000958
    [TBL] [Abstract][Full Text] [Related]  

  • 3. How (not) to protect genomic data privacy in a distributed network: using trail re-identification to evaluate and design anonymity protection systems.
    Malin B; Sweeney L
    J Biomed Inform; 2004 Jun; 37(3):179-92. PubMed ID: 15196482
    [TBL] [Abstract][Full Text] [Related]  

  • 4. A computational model to protect patient data from location-based re-identification.
    Malin B
    Artif Intell Med; 2007 Jul; 40(3):223-39. PubMed ID: 17544262
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Enhancing privacy and authorization control scalability in the grid through ontologies.
    Blanquer I; Hernández V; Segrelles D; Torres E
    IEEE Trans Inf Technol Biomed; 2009 Jan; 13(1):16-24. PubMed ID: 19129020
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Enabling location privacy and medical data encryption in patient telemonitoring systems.
    Maglogiannis I; Kazatzopoulos L; Delakouridis K; Hadjiefthymiades S
    IEEE Trans Inf Technol Biomed; 2009 Nov; 13(6):946-54. PubMed ID: 19171519
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Smart cards and their opportunities for controlling health information systems.
    Kühnel E; Klepser G; Engelbrecht R
    Int J Biomed Comput; 1994 Feb; 35 Suppl():153-7. PubMed ID: 8188409
    [TBL] [Abstract][Full Text] [Related]  

  • 8. [A security protocol for the exchange of personal medical data via Internet: monitoring treatment and drug effects].
    Viviani R; Fischer J; Spitzer M; Freudenmann RW
    Gesundheitswesen; 2004 Apr; 66(4):232-9. PubMed ID: 15100939
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Design and implementation of a smart card based healthcare information system.
    Kardas G; Tunali ET
    Comput Methods Programs Biomed; 2006 Jan; 81(1):66-78. PubMed ID: 16356586
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Securing the transmission and storage of medical information.
    Sardinas JL; Muldoon JD
    Comput Nurs; 1998; 16(3):162-8; quiz 169-70. PubMed ID: 9611868
    [TBL] [Abstract][Full Text] [Related]  

  • 11. [Security services: an overview of the French legislation on cryptography].
    Quantin C; Kerkri E; Allaert FA; Bouzelat H; Dusserre L
    Rev Epidemiol Sante Publique; 2000 Jan; 48(1):81-7. PubMed ID: 10740087
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Formal policies for flexible EHR security.
    Blobel B; Pharow P
    Stud Health Technol Inform; 2006; 121():307-16. PubMed ID: 17095829
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Secure publish-subscribe protocols for heterogeneous medical wireless body area networks.
    Picazo-Sanchez P; Tapiador JE; Peris-Lopez P; Suarez-Tangil G
    Sensors (Basel); 2014 Nov; 14(12):22619-42. PubMed ID: 25460814
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Smart cards--a security tool for health information systems.
    Klein GO
    Int J Biomed Comput; 1994 Feb; 35 Suppl():147-51. PubMed ID: 8188408
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Design of a JAIN SLEE/ESB-based platform for routing medical data in the ICU.
    Van Den Bossche B; Van Hoecke S; Danneels C; Decruyenaere J; Dhoedt B; De Turck F
    Comput Methods Programs Biomed; 2008 Sep; 91(3):265-77. PubMed ID: 18599150
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Medical records, 2: security and confidentiality.
    Last J
    Ann R Coll Physicians Surg Can; 1994 Feb; 27(1):8-9. PubMed ID: 15362241
    [No Abstract]   [Full Text] [Related]  

  • 17. Securing electronic health records without impeding the flow of information.
    Agrawal R; Johnson C
    Int J Med Inform; 2007; 76(5-6):471-9. PubMed ID: 17204451
    [TBL] [Abstract][Full Text] [Related]  

  • 18. How secure is the Internet for healthcare applications?
    Campbell LA
    Radiol Manage; 1996; 18(1):28-32. PubMed ID: 10154332
    [TBL] [Abstract][Full Text] [Related]  

  • 19. [Reliable cryptology as a means for confidentiality and safety in medical communication and documentation].
    Stehle W
    Zentralbl Gynakol; 1998; 120(7):350-3. PubMed ID: 9703659
    [TBL] [Abstract][Full Text] [Related]  

  • 20. A Lightweight Encryption Scheme Combined with Trust Management for Privacy-Preserving in Body Sensor Networks.
    Guo P; Wang J; Ji S; Geng XH; Xiong NN
    J Med Syst; 2015 Dec; 39(12):190. PubMed ID: 26490148
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 6.