Securing communications in a health environment

被引:0
|
作者
Brown, D
机构
关键词
D O I
暂无
中图分类号
R-058 [];
学科分类号
摘要
引用
收藏
页码:142 / 143
页数:2
相关论文
共 50 条
  • [41] SECURING MAINSTREAMING IN A HOSTILE POLITICAL ENVIRONMENT
    Nott, Sue
    [J]. INTERNATIONAL JOURNAL OF DISCRIMINATION AND THE LAW, 2005, 8 (1-2) : 121 - 140
  • [42] Securing wireless networks in a university environment
    Eisinger, J
    Winterer, P
    Becker, B
    [J]. Third IEEE International Conference on Pervasive Computing and Communications, Workshops, 2005, : 312 - 316
  • [43] Securing personal health information access in mobile healthcare environment through short signature schemes
    School of IT and Computer Science, University of Wollongong, Northfields Avenue, NSW 2522, Australia
    [J]. Int. J. Mobile Commun., 2007, 2 (215-224):
  • [44] Securing Iraq's health
    De Ceukelaire, W
    Jabbour, S
    Stephens, C
    [J]. LANCET, 2003, 362 (9399): : 1938 - 1938
  • [45] Special issue: securing computer communications with public key infrastructure
    Katsikas, SK
    Patel, A
    [J]. COMPUTER COMMUNICATIONS, 2003, 26 (16) : 1813 - 1814
  • [46] CMXsafe: A Proxy Layer for Securing Internet-of-Things Communications
    de Hoz Diego, Jorge David
    Madi, Taous
    Konstantinou, Charalambos
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 5767 - 5782
  • [47] RECREATING THE COMMUNICATIONS ENVIRONMENT
    CHECK, BJ
    FERGUSON, M
    [J]. VLSI SYSTEMS DESIGN, 1988, 9 (12): : 62 - &
  • [48] COMMUNICATIONS AND ENGINEERING ENVIRONMENT
    BERMAN, I
    [J]. MECHANICAL ENGINEERING, 1978, 100 (08): : 24 - 29
  • [49] Securing Underwater Acoustic Communications through Analog Network Coding
    Kulhandjian, Hovannes
    Melodia, Tommaso
    Koutsonikolas, Dimitrios
    [J]. 2014 ELEVENTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON SENSING, COMMUNICATION, AND NETWORKING (SECON), 2014, : 266 - 274
  • [50] Public Key Cryptography Based Approach for Securing SCADA Communications
    Saxena, Anupam
    Pal, Om
    Saquib, Zia
    [J]. COMPUTER NETWORKS AND INFORMATION TECHNOLOGIES, 2011, 142 : 56 - 62