250 related articles for article (PubMed ID: 23920753)
1. Anonymizing patient genomic data for public sharing association studies.
Fernandez-Lozano C; Lopez-Campos G; Seoane JA; Lopez-Alonso V; Dorado J; Martín-Sanchez F; Pazos A
Stud Health Technol Inform; 2013; 192():979. PubMed ID: 23920753
[TBL] [Abstract][Full Text] [Related]
2. Incentivizing data donation.
Nat Biotechnol; 2015 Sep; 33(9):885. PubMed ID: 26348938
[No Abstract] [Full Text] [Related]
3. Separation of personal data in a biobank information system.
Müller TH; Thasler R
Stud Health Technol Inform; 2014; 205():388-92. PubMed ID: 25160212
[TBL] [Abstract][Full Text] [Related]
4. [Encryption technique for linkable anonymizing].
Okamoto E
Nihon Koshu Eisei Zasshi; 2004 Jun; 51(6):445-51. PubMed ID: 15296025
[TBL] [Abstract][Full Text] [Related]
5. The design and implementation of a ubiquitous personal health record system for South Africa.
Kyazze M; Wesson J; Naude K
Stud Health Technol Inform; 2014; 206():29-41. PubMed ID: 25365669
[TBL] [Abstract][Full Text] [Related]
6. How (not) to protect genomic data privacy in a distributed network: using trail re-identification to evaluate and design anonymity protection systems.
Malin B; Sweeney L
J Biomed Inform; 2004 Jun; 37(3):179-92. PubMed ID: 15196482
[TBL] [Abstract][Full Text] [Related]
7. Secure cloud computing for genomic data.
Datta S; Bettinger K; Snyder M
Nat Biotechnol; 2016 Jun; 34(6):588-91. PubMed ID: 27281411
[No Abstract] [Full Text] [Related]
8. Key-linked on-line databases for clinical research.
Müller TH
Stud Health Technol Inform; 2012; 180():524-8. PubMed ID: 22874246
[TBL] [Abstract][Full Text] [Related]
9. Establishing end-to-end security in a nationwide network for telecooperation.
Staemmler M; Walz M; Weisser G; Engelmann U; Weininger R; Ernstberger A; Sturm J
Stud Health Technol Inform; 2012; 180():512-6. PubMed ID: 22874243
[TBL] [Abstract][Full Text] [Related]
10. A secure cryptographic scheme: protecting stored and transmitted mHealth patient data.
Velez D; Shanblatt M
Biomed Instrum Technol; 2013; 47(1):46-53. PubMed ID: 23432561
[No Abstract] [Full Text] [Related]
11. Efficient medical information retrieval in encrypted Electronic Health Records.
Pruski C; Wisniewski F
Stud Health Technol Inform; 2012; 180():225-9. PubMed ID: 22874185
[TBL] [Abstract][Full Text] [Related]
12. Securing electronic health records without impeding the flow of information.
Agrawal R; Johnson C
Int J Med Inform; 2007; 76(5-6):471-9. PubMed ID: 17204451
[TBL] [Abstract][Full Text] [Related]
13. Statistical disclosure limitation of health data based on Pk-anonymity.
Kimura E; Chida K; Ikarashi D; Hamada K; Ishihara K
Stud Health Technol Inform; 2012; 180():1117-9. PubMed ID: 22874372
[TBL] [Abstract][Full Text] [Related]
14. Health data collecting and sharing: case studies of Czech e-health applications.
Zvárová J; Lhotská L; Seidl L; Zvára K
Stud Health Technol Inform; 2012; 180():672-6. PubMed ID: 22874276
[TBL] [Abstract][Full Text] [Related]
15. Promotion of meaningful use of a personal health record in second life.
Knapfel S; Plattner B; Santo T; Tyndall S
Stud Health Technol Inform; 2014; 201():413-7. PubMed ID: 24943575
[TBL] [Abstract][Full Text] [Related]
16. Balancing the need for big data and patient data privacy--an IT infrastructure for a decentralized emergency care research database.
Ahlbrandt J; Brammen D; Majeed RW; Lefering R; Semler SC; Thun S; Walcher F; Röhrig R
Stud Health Technol Inform; 2014; 205():750-4. PubMed ID: 25160287
[TBL] [Abstract][Full Text] [Related]
17. Honest broker protocol streamlines research access to data while safeguarding patient privacy.
Silvey SA; Schulte J; Smaltz DH; Kamal J
AMIA Annu Symp Proc; 2008 Nov; ():1133. PubMed ID: 18999058
[TBL] [Abstract][Full Text] [Related]
18. Patient information, consents and privacy protection scheme for an information system dedicated to pervasive developmental disorders.
Ben Said M; Robel L; Messiaen C; Craus Y; Jais JP; Golse B; Landais P
Stud Health Technol Inform; 2014; 205():755-9. PubMed ID: 25160288
[TBL] [Abstract][Full Text] [Related]
19. Productivity, part 2: cloud storage, remote meeting tools, screencasting, speech recognition software, password managers, and online data backup.
Lackey AE; Pandey T; Moshiri M; Lalwani N; Lall C; Bhargava P
J Am Coll Radiol; 2014 Jun; 11(6):580-8. PubMed ID: 24674716
[TBL] [Abstract][Full Text] [Related]
20. Secure count query on encrypted genomic data.
Hasan MZ; Mahdi MSR; Sadat MN; Mohammed N
J Biomed Inform; 2018 May; 81():41-52. PubMed ID: 29550393
[TBL] [Abstract][Full Text] [Related]
[Next] [New Search]