Format
Sort by

Send to

Choose Destination

Search results

Items: 7

1.

Evaluating the risk of patient re-identification from adverse drug event reports.

El Emam K, Dankar FK, Neisa A, Jonker E.

BMC Med Inform Decis Mak. 2013 Oct 5;13:114. doi: 10.1186/1472-6947-13-114.

2.

Estimating the re-identification risk of clinical data sets.

Dankar FK, El Emam K, Neisa A, Roffey T.

BMC Med Inform Decis Mak. 2012 Jul 9;12:66. doi: 10.1186/1472-6947-12-66.

3.

A Protocol for the secure linking of registries for HPV surveillance.

El Emam K, Samet S, Hu J, Peyton L, Earle C, Jayaraman GC, Wong T, Kantarcioglu M, Dankar F, Essex A.

PLoS One. 2012;7(7):e39915. doi: 10.1371/journal.pone.0039915.

4.

De-identifying a public use microdata file from the Canadian national discharge abstract database.

El Emam K, Paton D, Dankar F, Koru G.

BMC Med Inform Decis Mak. 2011 Aug 23;11:53. doi: 10.1186/1472-6947-11-53.

5.

A globally optimal k-anonymity method for the de-identification of health data.

El Emam K, Dankar FK, Issa R, Jonker E, Amyot D, Cogo E, Corriveau JP, Walker M, Chowdhury S, Vaillancourt R, Roffey T, Bottomley J.

J Am Med Inform Assoc. 2009 Sep-Oct;16(5):670-82. doi: 10.1197/jamia.M3144.

6.

Evaluating the Risk of Re-identification of Patients from Hospital Prescription Records.

Emam KE, Dankar FK, Vaillancourt R, Roffey T, Lysyk M.

Can J Hosp Pharm. 2009 Jul;62(4):307-19.

7.

Protecting privacy using k-anonymity.

El Emam K, Dankar FK.

J Am Med Inform Assoc. 2008 Sep-Oct;15(5):627-37. doi: 10.1197/jamia.M2716.

Items per page

Supplemental Content

Loading ...
Support Center