These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


PUBMED FOR HANDHELDS

Journal Abstract Search


361 related items for PubMed ID: 18560070

  • 1.
    ; . PubMed ID:
    [No Abstract] [Full Text] [Related]

  • 2.
    ; . PubMed ID:
    [No Abstract] [Full Text] [Related]

  • 3. Watermarking medical images with anonymous patient identification to verify authenticity.
    Coatrieux G, Quantin C, Montagner J, Fassa M, Allaert FA, Roux C.
    Stud Health Technol Inform; 2008; 136():667-72. PubMed ID: 18487808
    [Abstract] [Full Text] [Related]

  • 4. Purposes of health identification cards and role of a secure access platform (Be-Health) in Belgium.
    France FH, Bangels M, De Clercq E.
    Int J Med Inform; 2007; 76(2-3):84-8. PubMed ID: 17126596
    [Abstract] [Full Text] [Related]

  • 5. A model driven approach for the German health telematics architectural framework and security infrastructure.
    Blobel B, Pharow P.
    Int J Med Inform; 2007; 76(2-3):169-75. PubMed ID: 16844404
    [Abstract] [Full Text] [Related]

  • 6. Towards dynamic access control for healthcare information systems.
    Røstad L, Nytrø O.
    Stud Health Technol Inform; 2008; 136():703-8. PubMed ID: 18487814
    [Abstract] [Full Text] [Related]

  • 7. High level security policies for health: from theory to practice.
    Defteraios S, Lambrinoudakis C, Gritzalis D.
    Stud Health Technol Inform; 2004; 103():416-23. PubMed ID: 15747949
    [Abstract] [Full Text] [Related]

  • 8. Security and privacy of EHR systems--ethical, social and legal requirements.
    Kluge EH.
    Stud Health Technol Inform; 2003; 96():121-7. PubMed ID: 15061533
    [Abstract] [Full Text] [Related]

  • 9.
    ; . PubMed ID:
    [No Abstract] [Full Text] [Related]

  • 10.
    ; . PubMed ID:
    [No Abstract] [Full Text] [Related]

  • 11.
    ; . PubMed ID:
    [No Abstract] [Full Text] [Related]

  • 12.
    ; . PubMed ID:
    [No Abstract] [Full Text] [Related]

  • 13.
    ; . PubMed ID:
    [No Abstract] [Full Text] [Related]

  • 14. [Identity vigilance and implementation of transfusion software in hospitals].
    Raynal MJ.
    Transfus Clin Biol; 2008 Nov; 15(5):274-6. PubMed ID: 18930682
    [Abstract] [Full Text] [Related]

  • 15.
    ; . PubMed ID:
    [No Abstract] [Full Text] [Related]

  • 16.
    ; . PubMed ID:
    [No Abstract] [Full Text] [Related]

  • 17. Specific interoperability problems of security infrastructure services.
    Pharow P, Blobel B.
    Stud Health Technol Inform; 2006 Nov; 121():349-63. PubMed ID: 17095833
    [Abstract] [Full Text] [Related]

  • 18. Architecture and tools for open, interoperable and portable EHRs.
    Blobel B.
    Stud Health Technol Inform; 2003 Nov; 97():25-33. PubMed ID: 15537227
    [Abstract] [Full Text] [Related]

  • 19. Privacy and efficiency in patients focused health care processes.
    Morger O, Nitsche U, Teufel S.
    Stud Health Technol Inform; 1998 Nov; 52 Pt 2():1143-7. PubMed ID: 10384638
    [Abstract] [Full Text] [Related]

  • 20. Mobile health requires mobile security: challenges, solutions, and standardization.
    Pharow P, Blobel B.
    Stud Health Technol Inform; 2008 Nov; 136():697-702. PubMed ID: 18487813
    [Abstract] [Full Text] [Related]


    Page: [Next] [New Search]
    of 19.