These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
166 related articles for article (PubMed ID: 20703610)
21. PAX: Using Pseudonymization and Anonymization to Protect Patients' Identities and Data in the Healthcare System. Al-Zubaidie M; Zhang Z; Zhang J Int J Environ Res Public Health; 2019 Apr; 16(9):. PubMed ID: 31035551 [TBL] [Abstract][Full Text] [Related]
22. Authentication systems for securing clinical documentation workflows. A systematic literature review. Schwartze J; Haarbrandt B; Fortmeier D; Haux R; Seidel C Methods Inf Med; 2014; 53(1):3-13. PubMed ID: 24247789 [TBL] [Abstract][Full Text] [Related]
23. Security Privacy and Policy for Cryptographic Based Electronic Medical Information System. Chen HY; Wu ZY; Chen TL; Huang YM; Liu CH Sensors (Basel); 2021 Jan; 21(3):. PubMed ID: 33494288 [TBL] [Abstract][Full Text] [Related]
24. Enabling Patient Control of Personal Electronic Health Records Through Distributed Ledger Technology. Cunningham J; Ainsworth J Stud Health Technol Inform; 2017; 245():45-48. PubMed ID: 29295049 [TBL] [Abstract][Full Text] [Related]
25. Are privacy-enhancing technologies for genomic data ready for the clinic? A survey of medical experts of the Swiss HIV Cohort Study. Raisaro JL; McLaren PJ; Fellay J; Cavassini M; Klersy C; Hubaux JP; J Biomed Inform; 2018 Mar; 79():1-6. PubMed ID: 29331453 [TBL] [Abstract][Full Text] [Related]
26. Privacy, confidentiality, security and patient safety concerns about electronic health records. Bani Issa W; Al Akour I; Ibrahim A; Almarzouqi A; Abbas S; Hisham F; Griffiths J Int Nurs Rev; 2020 Jun; 67(2):218-230. PubMed ID: 32314398 [TBL] [Abstract][Full Text] [Related]
27. Real-Time Medical Systems Based on Human Biometric Steganography: a Systematic Review. Mohsin AH; Zaidan AA; Zaidan BB; Ariffin SAB; Albahri OS; Albahri AS; Alsalem MA; Mohammed KI; Hashim M J Med Syst; 2018 Oct; 42(12):245. PubMed ID: 30374820 [TBL] [Abstract][Full Text] [Related]
28. BSF-EHR: Blockchain Security Framework for Electronic Health Records of Patients. Abunadi I; Kumar RL Sensors (Basel); 2021 Apr; 21(8):. PubMed ID: 33921738 [TBL] [Abstract][Full Text] [Related]
29. Safeguarding Confidentiality in Electronic Health Records. Shenoy A; Appel JM Camb Q Healthc Ethics; 2017 Apr; 26(2):337-341. PubMed ID: 28361730 [TBL] [Abstract][Full Text] [Related]
30. Privacy Protection for Telecare Medicine Information Systems Using a Chaotic Map-Based Three-Factor Authenticated Key Agreement Scheme. Zhang L; Zhu S; Tang S IEEE J Biomed Health Inform; 2017 Mar; 21(2):465-475. PubMed ID: 26766384 [TBL] [Abstract][Full Text] [Related]
31. Anonymity Preserving and Lightweight Multimedical Server Authentication Protocol for Telecare Medical Information System. Amin R; Islam SH; Gope P; Choo KR; Tapas N IEEE J Biomed Health Inform; 2019 Jul; 23(4):1749-1759. PubMed ID: 31283471 [TBL] [Abstract][Full Text] [Related]
32. A secure biometrics-based authentication key exchange protocol for multi-server TMIS using ECC. Qi M; Chen J; Chen Y Comput Methods Programs Biomed; 2018 Oct; 164():101-109. PubMed ID: 30195418 [TBL] [Abstract][Full Text] [Related]
33. Securing electronic health records without impeding the flow of information. Agrawal R; Johnson C Int J Med Inform; 2007; 76(5-6):471-9. PubMed ID: 17204451 [TBL] [Abstract][Full Text] [Related]
34. An Efficient Mobile-Healthcare Emergency Framework. Meshram C; Lee CC; Meshram SG; Ramteke RJ; Meshram A J Med Syst; 2020 Jan; 44(3):58. PubMed ID: 32002669 [TBL] [Abstract][Full Text] [Related]
35. Protection of electronic health records (EHRs) in cloud. Alabdulatif A; Khalil I; Mai V Annu Int Conf IEEE Eng Med Biol Soc; 2013; 2013():4191-4. PubMed ID: 24110656 [TBL] [Abstract][Full Text] [Related]
36. Disambiguating Between Privacy and Security in the Context of Health Care: New Insights on the Determinants of Health Technologies Use. Kisekka V; Goel S; Williams K Cyberpsychol Behav Soc Netw; 2021 Sep; 24(9):617-623. PubMed ID: 34152853 [TBL] [Abstract][Full Text] [Related]
37. New threats to health data privacy. Li F; Zou X; Liu P; Chen JY BMC Bioinformatics; 2011 Nov; 12 Suppl 12(Suppl 12):S7. PubMed ID: 22168526 [TBL] [Abstract][Full Text] [Related]
38. The need for technical solutions for maintaining the privacy of EHR. Ray P; Wimalasiri J Conf Proc IEEE Eng Med Biol Soc; 2006; 2006():4686-9. PubMed ID: 17947109 [TBL] [Abstract][Full Text] [Related]
39. Toward Proper Authentication Methods in Electronic Medical Record Access Compliant to HIPAA and C.I.A. Triangle. Tipton SJ; Forkey S; Choi YB J Med Syst; 2016 Apr; 40(4):100. PubMed ID: 26872782 [TBL] [Abstract][Full Text] [Related]
40. Biometrics and biosecurity. Kim TH; Mohammed S; Ramos C; Gervasi O; Fang WC; Stoica A J Biomed Biotechnol; 2012; 2012():684815. PubMed ID: 22988424 [No Abstract] [Full Text] [Related] [Previous] [Next] [New Search]