Citations
The paper
has been cited by the following works.
- J. Drozdz, J.D.
Kasprzak, M. Krzemińska-Pakula, J. Stępińska, and W. Ruzyllo.
Acute myocardial infarction in Poland in 1999. risk factors, treatment and
complications. Polish multicentre web-based trial (POL-WEB-AMI) (ostry
zawał serca w polsce w 1999 roku. czynniki ryzyka, leczenie i powikłania.
wyniki ankiety internetowej).
Kardiologia Polska, 53(12):527–532, 2000.
In Polish.
- Rainer M. M. Seibel,
Klaus Kocher, and Peter Landsberg.
Sicherheitsaspekte im internet (internet security aspects).
Der Radiologe, 40(4):1081–194, 2000.
In German.
- T. Frankewitsch and U. Prokosch.
Navigation in medical internet image databases.
Medical Informatics and the Internet in Medicine, 26(1):1–15,
March 2001.
(doi:10.1080/14639230010013971)
- Dimitris Lekkas.
Trusted Third Parties for Deploying Secure Information Systems.
PhD thesis, Department of Information and Communication Systems, University of
the Aegean, Samos, Greece, December 2001.
- R.E. Link, P.G. Schulam,
and L. R. Kavoussi.
Telesurgery — remote monitoring and assistance during laparoscopy.
Urologic Clinics of North America, 28(1):177–187, February
2001.
- F. Ichihashi,
Y. Sankai, and S. Kuno.
Development of secure data management server for ehealth promotion system.
International Journal of Sport and Health Science, 4:617–627,
2006.
- S. Jieun and
C. Myungae.
An approach to realization and security provision of intelligent u-healthcare
service.
In Proceedings — 2006 International Conference on Hybrid Information
Technology, ICHIT 2006, pages 462–467, 2006.
(doi:10.1109/ICHIT.2006.253527)
- S. Jieun and
C. Myungae.
SHOES: Secure healthcare oriented environement service model.
In IEEE 2006 Biomedical Circuits and Systems Conference Healthcare
Technology, BioCAS 2006, pages 89–93, 2006.
(doi:10.1109/BIOCAS.2006.4600315)
- C. Song and M. Chun.
An approach to realization and security provision ofintelligent U-Healthcare
service.
In Proceedings of the ICHIT'06 2006 Conference on Hybrid Information
Technology, pages 462–467, 2006.
- F. Al-Nayadi and
J.H. Abawajy.
An authentication framework for e-health systems.
In ISSPIT 2007 — 2007 IEEE International Symposium on Signal Processing
and Information Technology, pages 616–620, 2007.
(doi:10.1109/ISSPIT.2007.4458207)
- I. Pavlović and D. Miklavćíc.
Web-based electronic data collection system to support electrochemotherapy
clinical trial.
IEEE Transactions on Information Technology in Biomedicine,
11(2):222–230, 2007.
(doi:10.1109/TITB.2006.879581)
- P.A.H. Williams.
A holistic perspective on models for medical information security.
In Proceedings of The 2007 International Conference on Security and
Management, SAM'07, pages 510–519, 2007.
- M. Nkosi and
F. Mekuria.
Improving the capacity, reliability and life of mobile devices with cloud
computing.
2011 IST-Africa Conference Proceedings, IST 2011, 2011.
- M.T. Nkosi, F. Mekuria,
and S.H. Gejibo.
Challenges in mobile bio-sensor based mHealth development.
In 2011 IEEE 13th International Conference on e-Health Networking,
Applications and Services, HEALTHCOM 2011, pages 21–27, 2011.
(doi:10.1109/HEALTH.2011.6026750)
- C.-Y. Lien, T.-L. Yang,
C.-H. Hsiao, and T. Kao.
Realizing digital signatures for medical imaging and reporting in a PACS
environment.
Journal of Medical Systems, 37(1), 2013.
(doi:10.1007/s10916-012-9924-1)
- J. Wang, Z. Zhang,
K. Xu, Y. Yin, and P. Guo.
A research on security and privacy issues for patient related data in medical
organization system.
International Journal of Security and its Applications,
7(4):287–298, 2013.
- P.M. Durai
Raj Vincent.
Secured healthcare date exchange using proposed security scheme.
International Journal of Pharmacy and Technology,
8(2):12144–12154, 2016.
Home
Unless otherwise expressly stated, all original material on this page created by Diomidis Spinellis is licensed under a Creative Commons Attribution-Share Alike 3.0 Greece License.