These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

134 related articles for article (PubMed ID: 21317106)

  • 1. How strong are passwords used to protect personal health information in clinical trials?
    El Emam K; Moreau K; Jonker E
    J Med Internet Res; 2011 Feb; 13(1):e18. PubMed ID: 21317106
    [TBL] [Abstract][Full Text] [Related]  

  • 2. How to create memorizable and strong passwords.
    Cipresso P; Gaggioli A; Serino S; Cipresso S; Riva G
    J Med Internet Res; 2012 Jan; 14(1):e10. PubMed ID: 22233980
    [No Abstract]   [Full Text] [Related]  

  • 3. LPG-PCFG: An Improved Probabilistic Context- Free Grammar to Hit Low-Probability Passwords.
    Guo X; Tan K; Liu Y; Jin M; Lu H
    Sensors (Basel); 2022 Jun; 22(12):. PubMed ID: 35746386
    [TBL] [Abstract][Full Text] [Related]  

  • 4. "Passwords protect my stuff"-a study of children's password practices.
    Choong YY; Theofanos MF; Renaud K; Prior S
    J Cybersecur; 2019; 5(1):. PubMed ID: 33042580
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Blockchain Private File Storage-Sharing Method Based on IPFS.
    Kang P; Yang W; Zheng J
    Sensors (Basel); 2022 Jul; 22(14):. PubMed ID: 35890780
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Individual differences in cyber security behaviors: an examination of who is sharing passwords.
    Whitty M; Doodson J; Creese S; Hodges D
    Cyberpsychol Behav Soc Netw; 2015 Jan; 18(1):3-7. PubMed ID: 25517697
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Privacy Preservation in Patient Information Exchange Systems Based on Blockchain: System Design Study.
    Lee S; Kim J; Kwon Y; Kim T; Cho S
    J Med Internet Res; 2022 Mar; 24(3):e29108. PubMed ID: 35315778
    [TBL] [Abstract][Full Text] [Related]  

  • 8. How secure is your information system? An investigation into actual healthcare worker password practices.
    Cazier JA; Medlin BD
    Perspect Health Inf Manag; 2006 Sep; 3():8. PubMed ID: 18066366
    [TBL] [Abstract][Full Text] [Related]  

  • 9. P2P watch: personal health information detection in peer-to-peer file-sharing networks.
    Sokolova M; El Emam K; Arbuckle L; Neri E; Rose S; Jonker E
    J Med Internet Res; 2012 Jul; 14(4):e95. PubMed ID: 22776692
    [TBL] [Abstract][Full Text] [Related]  

  • 10. The inadvertent disclosure of personal health information through peer-to-peer file sharing programs.
    El Emam K; Neri E; Jonker E; Sokolova M; Peyton L; Neisa A; Scassa T
    J Am Med Inform Assoc; 2010; 17(2):148-58. PubMed ID: 20190057
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Recurrent GANs Password Cracker For IoT Password Security Enhancement.
    Nam S; Jeon S; Kim H; Moon J
    Sensors (Basel); 2020 May; 20(11):. PubMed ID: 32486361
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Are participants concerned about privacy and security when using short message service to report product adherence in a rectal microbicide trial?
    Giguere R; Brown W; Balán IC; Dolezal C; Ho T; Sheinfil A; Ibitoye M; Lama JR; McGowan I; Cranston RD; Carballo-Diéguez A
    J Am Med Inform Assoc; 2018 Apr; 25(4):393-400. PubMed ID: 29025127
    [TBL] [Abstract][Full Text] [Related]  

  • 13. [Application of password manager software in health care].
    Ködmön J
    Orv Hetil; 2016 Dec; 157(52):2066-2073. PubMed ID: 28019111
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Improving computer security for authentication of users: influence of proactive password restrictions.
    Proctor RW; Lien MC; Vu KP; Schultz EE; Salvendy G
    Behav Res Methods Instrum Comput; 2002 May; 34(2):163-9. PubMed ID: 12109007
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Efficient medical information retrieval in encrypted Electronic Health Records.
    Pruski C; Wisniewski F
    Stud Health Technol Inform; 2012; 180():225-9. PubMed ID: 22874185
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Security controls in an integrated Biobank to protect privacy in data sharing: rationale and study design.
    Takai-Igarashi T; Kinoshita K; Nagasaki M; Ogishima S; Nakamura N; Nagase S; Nagaie S; Saito T; Nagami F; Minegishi N; Suzuki Y; Suzuki K; Hashizume H; Kuriyama S; Hozawa A; Yaegashi N; Kure S; Tamiya G; Kawaguchi Y; Tanaka H; Yamamoto M
    BMC Med Inform Decis Mak; 2017 Jul; 17(1):100. PubMed ID: 28683736
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Locking it down: The privacy and security of mobile medication apps.
    Grindrod K; Boersema J; Waked K; Smith V; Yang J; Gebotys C
    Can Pharm J (Ott); 2017; 150(1):60-66. PubMed ID: 28286594
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Prevalence of Sharing Access Credentials in Electronic Medical Records.
    Hassidim A; Korach T; Shreberk-Hassidim R; Thomaidou E; Uzefovsky F; Ayal S; Ariely D
    Healthc Inform Res; 2017 Jul; 23(3):176-182. PubMed ID: 28875052
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Simple group password-based authenticated key agreements for the integrated EPR information system.
    Lee TF; Chang IP; Wang CC
    J Med Syst; 2013 Apr; 37(2):9916. PubMed ID: 23328913
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Security analysis and improvements to the PsychoPass method.
    Brumen B; Heričko M; Rozman I; Hölbl M
    J Med Internet Res; 2013 Aug; 15(8):e161. PubMed ID: 23942458
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 7.