These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
4. Patient Matching within a Health Information Exchange. Godlove T; Ball AW Perspect Health Inf Manag; 2015; 12(Spring):1g. PubMed ID: 26755901 [TBL] [Abstract][Full Text] [Related]
5. The adoption of IT security standards in a healthcare environment. Gomes R; Lapão LV Stud Health Technol Inform; 2008; 136():765-70. PubMed ID: 18487824 [TBL] [Abstract][Full Text] [Related]
6. Improving computer security for authentication of users: influence of proactive password restrictions. Proctor RW; Lien MC; Vu KP; Schultz EE; Salvendy G Behav Res Methods Instrum Comput; 2002 May; 34(2):163-9. PubMed ID: 12109007 [TBL] [Abstract][Full Text] [Related]
7. An approach for message exchange using archetypes. Moraes JL; Souza WL; Cavalini LT; Pires LF; Prado AF Stud Health Technol Inform; 2013; 192():1136. PubMed ID: 23920910 [TBL] [Abstract][Full Text] [Related]
8. Evaluation of Secure Computation in a Distributed Healthcare Setting. Kimura E; Hamada K; Kikuchi R; Chida K; Okamoto K; Manabe S; Kuroda T; Matsumura Y; Takeda T; Mihara N Stud Health Technol Inform; 2016; 228():152-6. PubMed ID: 27577361 [TBL] [Abstract][Full Text] [Related]
9. Ahead of the curve or out of the loop? Ten challenges to nuclear medicine interconnectivity. Siegel E J Nucl Med; 2003 Oct; 44(10):14N, 16N. PubMed ID: 14584498 [No Abstract] [Full Text] [Related]
10. How strong are passwords used to protect personal health information in clinical trials? El Emam K; Moreau K; Jonker E J Med Internet Res; 2011 Feb; 13(1):e18. PubMed ID: 21317106 [TBL] [Abstract][Full Text] [Related]
11. LPG-PCFG: An Improved Probabilistic Context- Free Grammar to Hit Low-Probability Passwords. Guo X; Tan K; Liu Y; Jin M; Lu H Sensors (Basel); 2022 Jun; 22(12):. PubMed ID: 35746386 [TBL] [Abstract][Full Text] [Related]
12. Can cloud computing benefit health services? - a SWOT analysis. Kuo MH; Kushniruk A; Borycki E Stud Health Technol Inform; 2011; 169():379-83. PubMed ID: 21893777 [TBL] [Abstract][Full Text] [Related]
13. Cognitive Based Authentication Protocol for Distributed Data and Web Technologies. Krzyworzeka N; Ogiela L; Ogiela MR Sensors (Basel); 2021 Oct; 21(21):. PubMed ID: 34770571 [TBL] [Abstract][Full Text] [Related]
14. Secure medical information sharing in cloud computing. Shao Z; Yang B; Zhang W; Zhao Y; Wu Z; Miao M Technol Health Care; 2015; 23 Suppl 1():S133-7. PubMed ID: 26410315 [TBL] [Abstract][Full Text] [Related]
15. Security analysis and improvements to the PsychoPass method. Brumen B; Heričko M; Rozman I; Hölbl M J Med Internet Res; 2013 Aug; 15(8):e161. PubMed ID: 23942458 [TBL] [Abstract][Full Text] [Related]
16. Data standards in health care. McDonald CJ; Schadow G; Suico J; Overhage JM Ann Emerg Med; 2001 Sep; 38(3):303-11. PubMed ID: 11524651 [No Abstract] [Full Text] [Related]
17. Prefetching of medical imaging data across XDS affinity domains. Helm E; Schuler A; Krauss O; Franz B Stud Health Technol Inform; 2015; 212():211-8. PubMed ID: 26063279 [TBL] [Abstract][Full Text] [Related]
18. Security, safety, and related technology - the triangle of eHealth service provision. Savastano M; Hovsto A; Pharow P; Blobel B Stud Health Technol Inform; 2008; 136():709-14. PubMed ID: 18487815 [TBL] [Abstract][Full Text] [Related]
19. ISO TC 215: what the health world needs now. Chute CG MD Comput; 1999; 16(3):21-2. PubMed ID: 10439594 [No Abstract] [Full Text] [Related]
20. Informatics in Radiology (infoRAD): personal computer security: part 2. Software Configuration and file protection. Caruso RD Radiographics; 2004; 24(5):1503-12. PubMed ID: 15371625 [TBL] [Abstract][Full Text] [Related] [Next] [New Search]