Format
Sort by
Items per page

Send to

Choose Destination

Links from PubMed

Items: 1 to 20 of 104

1.

Fuzzy assessment of health information system users' security awareness.

Aydın ÖM, Chouseinoglou O.

J Med Syst. 2013 Dec;37(6):9984. doi: 10.1007/s10916-013-9984-x. Epub 2013 Oct 20.

PMID:
24141530
2.
3.

Security and Privacy in a DACS.

Delgado J, Llorente S, Pàmies M, Vilalta J.

Stud Health Technol Inform. 2016;228:122-6.

PMID:
27577355
4.

Implementing healthcare information security: standards can help.

Orel A, Bernik I.

Stud Health Technol Inform. 2013;186:195-9.

PMID:
23542997
5.

Risk assessment of integrated electronic health records.

Bjornsson BT, Sigurdardottir G, Stefansson SO.

Stud Health Technol Inform. 2010;155:78-84.

PMID:
20543313
6.

A Privacy Preservation Model for Health-Related Social Networking Sites.

Li J.

J Med Internet Res. 2015 Jul 8;17(7):e168. doi: 10.2196/jmir.3973.

7.

Security analysis of a chaotic map-based authentication scheme for telecare medicine information systems.

Yau WC, Phan RC.

J Med Syst. 2013 Dec;37(6):9993. doi: 10.1007/s10916-013-9993-9. Epub 2013 Nov 6.

PMID:
24194093
8.

Security Attacks and Solutions in Electronic Health (E-health) Systems.

Zeadally S, Isaac JT, Baig Z.

J Med Syst. 2016 Dec;40(12):263. Epub 2016 Oct 11.

PMID:
27730389
9.

Three-factor anonymous authentication and key agreement scheme for Telecare Medicine Information Systems.

Arshad H, Nikooghadam M.

J Med Syst. 2014 Dec;38(12):136. doi: 10.1007/s10916-014-0136-8. Epub 2014 Oct 29.

PMID:
25352490
10.

EMRlog method for computer security for electronic medical records with logic and data mining.

Martínez Monterrubio SM, Frausto Solis J, Monroy Borja R.

Biomed Res Int. 2015;2015:542016. doi: 10.1155/2015/542016. Epub 2015 Oct 1.

11.

A novel fuzzy logic-based image steganography method to ensure medical data security.

Karakış R, Güler I, Çapraz I, Bilir E.

Comput Biol Med. 2015 Dec 1;67:172-83. doi: 10.1016/j.compbiomed.2015.10.011. Epub 2015 Oct 27.

PMID:
26555746
12.
14.

A Survey of Authentication Schemes in Telecare Medicine Information Systems.

Aslam MU, Derhab A, Saleem K, Abbas H, Orgun M, Iqbal W, Aslam B.

J Med Syst. 2017 Jan;41(1):14. Epub 2016 Nov 30. Review.

PMID:
27900653
15.

Information security requirements in patient-centred healthcare support systems.

Alsalamah S, Gray WA, Hilton J, Alsalamah H.

Stud Health Technol Inform. 2013;192:812-6.

PMID:
23920670
16.

A novel authentication scheme using self-certified public keys for telecare medical information systems.

Guo D, Wen Q, Li W, Zhang H, Jin Z.

J Med Syst. 2015 Jun;39(6):62. doi: 10.1007/s10916-015-0245-z. Epub 2015 Apr 2.

PMID:
25833752
18.

Concepts for a standard based cross-organisational information security management system in the context of a nationwide EHR.

Mense A, Hoheiser-Pförtner F, Schmid M, Wahl H.

Stud Health Technol Inform. 2013;192:548-52.

PMID:
23920615
19.

Cryptanalysis and improvement of an improved two factor authentication protocol for telecare medical information systems.

Chaudhry SA, Naqvi H, Shon T, Sher M, Farash MS.

J Med Syst. 2015 Jun;39(6):66. doi: 10.1007/s10916-015-0244-0. Epub 2015 Apr 26.

PMID:
25912427
20.

Le Valais stoppe son projet de dossier électronique du patient.

Lambiel X.

Rev Med Suisse. 2016 Jun 22;12(524):1255. French. No abstract available.

PMID:
27506079

Supplemental Content

Support Center