Secure solution for mobile access to patient's health care record
暂无分享,去创建一个
[1] Jeffrey Wood,et al. Mobile eLearning Platform for Interactive Patient Education , 2009, 2009 International Conference on Mobile, Hybrid, and On-line Learning.
[2] Anders Moen Hagalisletto,et al. Using the mobile phone in two-factor authentication , 2007 .
[3] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[4] Latif Al-Hakim,et al. Web Mobile-Based Applications for Healthcare Management , 2007 .
[5] John Fulcher. The use of smart devices in eHealth , 2003, ISICT.
[6] José Carlos Brustoloni,et al. Hardening Web browsers against man-in-the-middle and eavesdropping attacks , 2005, WWW '05.
[7] Robert S. H. Istepanian,et al. Emerging mobile communication technologies for health: some imperative notes on m-health , 2003, Proceedings of the 25th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (IEEE Cat. No.03CH37439).
[8] Xu Huang,et al. E-health Services with Secure Mobile Agent , 2009, 2009 Seventh Annual Communication Networks and Services Research Conference.
[9] Muttukrishnan Rajarajan,et al. XML Security based Access Control for Healthcare Information in Mobile Environment , 2006, 2006 Pervasive Health Conference and Workshops.
[10] Patrick Schaumont,et al. Java cryptography on KVM and its performance and security optimization using HW/SW co-design techniques , 2004, CASES '04.
[11] Eric Rescorla,et al. SSL and TLS: Designing and Building Secure Systems , 2000 .
[12] Serge Vaudenay. A classical introduction to cryptography - applications for communications security , 2005 .
[13] Lionel Tarassenko,et al. Chemotherapy side-effect management using mobile phones , 2008, 2008 30th Annual International Conference of the IEEE Engineering in Medicine and Biology Society.
[14] Kjell Jørgen Hole,et al. Security Analysis of Mobile Phones Used as OTP Generators , 2010, WISTP.
[15] Annie I. Antón,et al. Towards understanding user perceptions of authentication technologies , 2007, WPES '07.
[16] John A. MacDonald. Cellular authentication & key agreement for service providers , 2008, 2008 Second International Conference on Pervasive Computing Technologies for Healthcare.
[17] Ilias Maglogiannis,et al. Enabling Secure Mobile Access for Electronic Health Care Applications , 2006, 2006 Pervasive Health Conference and Workshops.
[18] Ingrid Rügge,et al. Mobile Applications in Health Care-a Regional Perspective , 2004 .
[19] H. De Vroom,et al. Organization for Economic Cooperation and Development (OECD) , 2006 .
[20] Michael Baentsch,et al. Remote Client Authentication , 2008, IEEE Security & Privacy.