nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A bilinear pairing based anonymous authentication scheme in wireless body area networks for mHealth
|
Jiang, Qi |
|
2016 |
40 |
11 |
p. 1-10 |
artikel |
2 |
A Firefly Algorithm-based Approach for Pseudo-Relevance Feedback: Application to Medical Database
|
Khennak, Ilyes |
|
2016 |
40 |
11 |
p. 1-15 |
artikel |
3 |
A Multiserver Biometric Authentication Scheme for TMIS using Elliptic Curve Cryptography
|
Chaudhry, Shehzad Ashraf |
|
2016 |
40 |
11 |
p. 1-13 |
artikel |
4 |
Analysis of Security Protocols for Mobile Healthcare
|
Wazid, Mohammad |
|
2016 |
40 |
11 |
p. 1-10 |
artikel |
5 |
An Automatic Prediction of Epileptic Seizures Using Cloud Computing and Wireless Sensor Networks
|
Sareen, Sanjay |
|
2016 |
40 |
11 |
p. 1-18 |
artikel |
6 |
A Novel Reference Security Model with the Situation Based Access Policy for Accessing EPHR Data
|
Gope, Prosanta |
|
2016 |
40 |
11 |
p. 1-14 |
artikel |
7 |
A Pathophysiological Model-Driven Communication for Dynamic Distributed Medical Best Practice Guidance Systems
|
Hosseini, Mohammad |
|
2016 |
40 |
11 |
p. 1-17 |
artikel |
8 |
A Provably Secure Aggregate Signature Scheme for Healthcare Wireless Sensor Networks
|
Shen, Limin |
|
2016 |
40 |
11 |
p. 1-10 |
artikel |
9 |
A Provably-Secure Transmission Scheme for Wireless Body Area Networks
|
Omala, Anyembe Andrew |
|
2016 |
40 |
11 |
p. 1-14 |
artikel |
10 |
A Robust and Anonymous Two Factor Authentication and Key Agreement Protocol for Telecare Medicine Information Systems
|
Xiong, Hu |
|
2016 |
40 |
11 |
p. 1-12 |
artikel |
11 |
A Secure Dynamic Identity and Chaotic Maps Based User Authentication and Key Agreement Scheme for e-Healthcare Systems
|
Li, Chun-Ta |
|
2016 |
40 |
11 |
p. 1-10 |
artikel |
12 |
Design of a Secure Authentication and Key Agreement Scheme Preserving User Privacy Usable in Telecare Medicine Information Systems
|
Arshad, Hamed |
|
2016 |
40 |
11 |
p. 1-19 |
artikel |
13 |
Enhancement of Structured Reporting – an Integration Reporting Module with Radiation Dose Collection Supporting
|
Lee, Ming-Che |
|
2016 |
40 |
11 |
p. 1-8 |
artikel |
14 |
Fine-grained Database Field Search Using Attribute-Based Encryption for E-Healthcare Clouds
|
Guo, Cheng |
|
2016 |
40 |
11 |
p. 1-8 |
artikel |
15 |
Hypergraph Based Feature Selection Technique for Medical Diagnosis
|
Somu, Nivethitha |
|
2016 |
40 |
11 |
p. 1-16 |
artikel |
16 |
IFCM Based Segmentation Method for Liver Ultrasound Images
|
Jain, Nishant |
|
2016 |
40 |
11 |
p. 1-12 |
artikel |
17 |
Implementation of a Novel Electronic Health Record-Embedded Physician Orders for Life-Sustaining Treatment System
|
Zive, Dana M. |
|
2016 |
40 |
11 |
p. 1-4 |
artikel |
18 |
m2-ABKS: Attribute-Based Multi-Keyword Search over Encrypted Personal Health Records in Multi-Owner Setting
|
Miao, Yinbin |
|
2016 |
40 |
11 |
p. 1-12 |
artikel |
19 |
Mining Health Social Media with Sentiment Analysis
|
Yang, Fu-Chen |
|
2016 |
40 |
11 |
p. 1-8 |
artikel |
20 |
Opportunities and Accountable Care Organizations
|
Babyar, Julie |
|
2016 |
40 |
11 |
p. 1-3 |
artikel |
21 |
Processing Time Reduction: an Application in Living Human High-Resolution Diffusion Magnetic Resonance Imaging Data
|
Lori, Nicolás F . |
|
2016 |
40 |
11 |
p. 1-8 |
artikel |
22 |
Secured Medical Images - a Chaotic Pixel Scrambling Approach
|
Parvees, M. Y. Mohamed |
|
2016 |
40 |
11 |
p. 1-11 |
artikel |
23 |
Semantically Enriched Data Access Policies in eHealth
|
Drozdowicz, Michał |
|
2016 |
40 |
11 |
p. 1-8 |
artikel |
24 |
Simulation of Trauma Incidents
|
Borri, Alessandro |
|
2016 |
40 |
11 |
p. 1-12 |
artikel |
25 |
The Impact of the Security Competency on “Self-Efficacy in Information Security” for Effective Health Information Security in Iran
|
Shahri, Ahmad Bakhtiyari |
|
2016 |
40 |
11 |
p. 1-9 |
artikel |