Search

Your search keyword '"data security"' showing total 576 results

Search Constraints

Start Over You searched for: Descriptor "data security" Remove constraint Descriptor: "data security" Journal journal of medical systems Remove constraint Journal: journal of medical systems
576 results on '"data security"'

Search Results

1. Electronic Health Records Sharing Based on Consortium Blockchain.

2. High Capacity and Reversible Fragile Watermarking Method for Medical Image Authentication and Patient Data Hiding.

3. Networking Aspects of the Electronic Health Records: Hypertext Transfer Protocol Version 2 (HTTP/2) vs HTTP/3.

4. Secure Cloud-Based Electronic Health Records: Cross-Patient Block-Level Deduplication with Blockchain Auditing.

5. Transformer Models in Healthcare: A Survey and Thematic Analysis of Potentials, Shortcomings and Risks.

6. Medical Image Encryption using Biometric Image Texture Fusion.

7. The Challenges of Establishing Assurance Labs for Health Artificial Intelligence (AI).

8. Patient Acceptance of Prescribed and Fully Reimbursed mHealth Apps in Germany: An UTAUT2-based Online Survey Study.

9. DataSifterText: Partially Synthetic Text Generation for Sensitive Clinical Notes.

10. Crowdsourcing Operational and Design Flaws of Diabetes Mobile Apps.

11. Factors Associated with Information Breach in Healthcare Facilities: A Systematic Literature Review.

12. Developing Data Sharing Models for Health Research with Real-World Data: A Scoping Review of Patient and Public Preferences.

13. Preserving Patient Privacy During Computation over Shared Electronic Health Record Data.

14. New Approach to Privacy-Preserving Clinical Decision Support Systems for HIV Treatment.

15. A Mobile App for the Precise Measurement of Healthcare Provider Activity Times to Support Time-Driven Activity Based Costing Studies.

16. Construction of a Chaotic Map-Based Authentication Protocol for TMIS.

17. Quality Assessment of Health-apps using a Public Agency Quality and Safety Seal. The Appsaludable Case.

18. An Efficient and Provable Secure Certificate-Based Combined Signature, Encryption and Signcryption Scheme for Internet of Things (IoT) in Mobile Health (M-Health) System.

19. An Efficient Cross-Domain Data Transmission Scheme for Wireless Body Area Networks.

20. Evaluating people's concern about their health information privacy based on power-responsibility equilibrium model: A case of Taiwan.

21. Efficient and Secure Attribute Based Access Control Architecture for Smart Healthcare.

22. Transforming Healthcare Cybersecurity from Reactive to Proactive: Current Status and Future Recommendations.

23. Efficient NTRU Lattice-Based Certificateless Signature Scheme for Medical Cyber-Physical Systems.

24. An Efficient Mobile-Healthcare Emergency Framework.

25. General Data Protection Regulation in Health Clinics.

26. Design of a Secure Medical Data Sharing Scheme Based on Blockchain.

27. A Parser to Support the Definition of Access Control Policies and Rules Using Natural Languages.

28. Private Hospital Workflow Optimization via Secure k-Means Clustering.

29. Construction of RSA-Based Authentication Scheme in Authorized Access to Healthcare Services: Authorized Access to Healthcare Services.

30. Cyber Attacks on Healthcare Devices Using Unmanned Aerial Vehicles.

31. A Systematic Review for Enabling of Develop a Blockchain Technology in Healthcare Application: Taxonomy, Substantially Analysis, Motivations, Challenges, Recommendations and Future Direction.

32. NPMA: A Novel Privacy-Preserving Mutual Authentication in TMIS for Mobile Edge-Cloud Architecture.

33. India: Intruder Node Detection and Isolation Action in Mobile Ad Hoc Networks Using Feature Optimization and Classification Approach.

34. Securing Personal Health Record System in Cloud Using User Usage Based Encryption.

35. DNA Cryptography and Deep Learning using Genetic Algorithm with NW algorithm for Key Generation.

36. Security Belt for Wireless Implantable Medical Devices.

37. Medical Images are Safe - an Enhanced Chaotic Scrambling Approach.

38. Security Techniques for the Electronic Health Records.

39. Secure Data Aggregation in Wireless Sensor Network-Fujisaki Okamoto(FO) Authentication Scheme against Sybil Attack.

40. Network Coded Cooperative Communication in a Real-Time Wireless Hospital Sensor Network.

41. A Mutual Authentication Framework for Wireless Medical Sensor Networks.

42. ICASME: An Improved Cloud-Based Authentication Scheme for Medical Environment.

43. Privacy-Preserving Integration of Medical Data.

44. An Efficient Remote Authentication Scheme for Wireless Body Area Network.

45. Patient-Controlled Attribute-Based Encryption for Secure Electronic Health Records System.

46. A Pathophysiological Model-Driven Communication for Dynamic Distributed Medical Best Practice Guidance Systems.

47. A Robust and Anonymous Two Factor Authentication and Key Agreement Protocol for Telecare Medicine Information Systems.

48. Massive Access Control Aided by Knowledge-Extraction for Co-Existing Periodic and Random Services over Wireless Clinical Networks.

49. Distributed Denial of Service Attack Source Detection Using Efficient Traceback Technique (ETT) in Cloud-Assisted Healthcare Environment.

50. A Provably Secure RFID Authentication Protocol Based on Elliptic Curve for Healthcare Environments.

Catalog

Books, media, physical & digital resources