These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

179 related articles for article (PubMed ID: 9304559)

  • 1. Network and data security design for telemedicine applications.
    Makris L; Argiriou N; Strintzis MG
    Med Inform (Lond); 1997; 22(2):133-42. PubMed ID: 9304559
    [TBL] [Abstract][Full Text] [Related]  

  • 2. A Double Chaotic Layer Encryption Algorithm for Clinical Signals in Telemedicine.
    Murillo-Escobar MA; Cardoza-Avendaño L; López-Gutiérrez RM; Cruz-Hernández C
    J Med Syst; 2017 Apr; 41(4):59. PubMed ID: 28247306
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Multiuser communication scheme based on binary phase-shift keying and chaos for telemedicine.
    Michel-Macarty JA; Murillo-Escobar MA; López-Gutiérrez RM; Cruz-Hernández C; Cardoza-Avendaño L
    Comput Methods Programs Biomed; 2018 Aug; 162():165-175. PubMed ID: 29903483
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Telemedicine and security. Confidentiality, integrity, and availability: a Canadian perspective.
    Jennett P; Watanabe M; Igras E; Premkumar K; Hall W
    Stud Health Technol Inform; 1996; 29():286-98. PubMed ID: 10163762
    [TBL] [Abstract][Full Text] [Related]  

  • 5. A joint signal processing and cryptographic approach to multimedia encryption.
    Mao Y; Wu M
    IEEE Trans Image Process; 2006 Jul; 15(7):2061-75. PubMed ID: 16830924
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Demonstrating minimal invasive therapy over the Internet.
    Bennett R; Kirstein PT
    Int J Med Inform; 1997 Nov; 47(1-2):101-5. PubMed ID: 9506402
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Digital watermarking in telemedicine applications--towards enhanced data security and accessibility.
    Giakoumaki AL; Perakis K; Tagaris A; Koutsouris D
    Conf Proc IEEE Eng Med Biol Soc; 2006; 2006():6328-31. PubMed ID: 17946760
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Design and develop a video conferencing framework for real-time telemedicine applications using secure group-based communication architecture.
    Mat Kiah ML; Al-Bakri SH; Zaidan AA; Zaidan BB; Hussain M
    J Med Syst; 2014 Oct; 38(10):133. PubMed ID: 25199651
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Medical network security and viruses.
    Fernandez Del Val C
    Stud Health Technol Inform; 1991; 1():271-84. PubMed ID: 10164072
    [TBL] [Abstract][Full Text] [Related]  

  • 10. An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System.
    Li CT; Wu TY; Chen CL; Lee CC; Chen CM
    Sensors (Basel); 2017 Jun; 17(7):. PubMed ID: 28644381
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Crypto-Watermarking of Transmitted Medical Images.
    Al-Haj A; Mohammad A; Amer A
    J Digit Imaging; 2017 Feb; 30(1):26-38. PubMed ID: 27561753
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Realization of security concepts for DICOM-based distributed medical services.
    Bernarding J; Thiel A; Tolxdorff T
    Methods Inf Med; 2000 Dec; 39(4-5):348-52. PubMed ID: 11191705
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Securing electronic medical record in Near Field Communication using Advanced Encryption Standard (AES).
    Renardi MB; Basjaruddin NC; Rakhman E
    Technol Health Care; 2018; 26(2):357-362. PubMed ID: 29309046
    [TBL] [Abstract][Full Text] [Related]  

  • 14. An Efficient and Practical Smart Card Based Anonymity Preserving User Authentication Scheme for TMIS using Elliptic Curve Cryptography.
    Amin R; Islam SK; Biswas GP; Khan MK; Kumar N
    J Med Syst; 2015 Nov; 39(11):180. PubMed ID: 26433889
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Secure medical information sharing in cloud computing.
    Shao Z; Yang B; Zhang W; Zhao Y; Wu Z; Miao M
    Technol Health Care; 2015; 23 Suppl 1():S133-7. PubMed ID: 26410315
    [TBL] [Abstract][Full Text] [Related]  

  • 16. [Reliable cryptology as a means for confidentiality and safety in medical communication and documentation].
    Stehle W
    Zentralbl Gynakol; 1998; 120(7):350-3. PubMed ID: 9703659
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Securing health sensing using integrated circuit metric.
    Tahir R; Tahir H; McDonald-Maier K
    Sensors (Basel); 2015 Oct; 15(10):26621-42. PubMed ID: 26492250
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Security for decentralized health information systems.
    Bleumer G
    Int J Biomed Comput; 1994 Feb; 35 Suppl():139-45. PubMed ID: 8188407
    [TBL] [Abstract][Full Text] [Related]  

  • 19. A cryptologic based trust center for medical images.
    Wong ST
    J Am Med Inform Assoc; 1996; 3(6):410-21. PubMed ID: 8930857
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Fine-grained Database Field Search Using Attribute-Based Encryption for E-Healthcare Clouds.
    Guo C; Zhuang R; Jie Y; Ren Y; Wu T; Choo KR
    J Med Syst; 2016 Nov; 40(11):235. PubMed ID: 27653042
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 9.