Application of Time-Limit Key Management Mechanism on Electronic Medical Record System
暂无分享,去创建一个
Sheng-De Wang | Tzer-Shyong Chen | Yu-Min Huang | Kuang-Yen Tai | Kai-Jen Chiu | Yin-Tzu Huang | Tzer-Shyong Chen | Sheng-De Wang | Yin-Tzu Huang | Kuang-Yen Tai | Yu-Min Huang | Kai-Jen Chiu
[1] Yuh-Min Tseng,et al. Revocable Certificateless Public Key Encryption , 2015, IEEE Systems Journal.
[2] Mehdi Mahdavian,et al. An investigation of the success of hospital information systems implementation: A case study , 2014, 2014 International Computer Science and Engineering Conference (ICSEC).
[3] Darshana Patel,et al. Mobile agent and distributed data mining , 2016, 2016 2nd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT).
[4] Xiaohua Hu,et al. An error detecting and tagging framework for reducing data entry errors in electronic medical records (EMR) system , 2013, 2013 IEEE International Conference on Bioinformatics and Biomedicine.
[5] Gang Hu. Study of file encryption and decryption system using security key , 2010, 2010 2nd International Conference on Computer Engineering and Technology.
[6] M.-H. Guo,et al. Centralised conference key mechanism with elliptic curve cryptography and lagrange interpolation for sensor networks , 2011, IET Commun..
[7] Vanga Odelu,et al. LHSC: An effective dynamic key management scheme for linear hierarchical access control , 2013, 2013 Fifth International Conference on Communication Systems and Networks (COMSNETS).
[8] Yun Wan,et al. Lessons from method: A successful Electronic Medical Record (EMR) system implementation , 2011, Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics.
[9] Ramon Martí,et al. Secure Integration of Distributed Medical Data Using Mobile Agents , 2006, IEEE Intelligent Systems.