Found: 5
Select item for more details and to access through your institution.
The Secure Authorization Model for Healthcare Information System.
- Published in:
- Journal of Medical Systems, 2013, v. 37, n. 5, p. 1, doi. 10.1007/s10916-013-9974-z
- By:
- Publication type:
- Article
Secure Mobile Agent for Telemedicine Based on P2P Networks.
- Published in:
- Journal of Medical Systems, 2013, v. 37, n. 3, p. 1, doi. 10.1007/s10916-013-9947-2
- By:
- Publication type:
- Article
An Enhanced Lightweight Dynamic Pseudonym Identity Based Authentication and Key Agreement Scheme Using Wireless Sensor Networks for Agriculture Monitoring.
- Published in:
- Sensors (14248220), 2019, v. 19, n. 5, p. 1146, doi. 10.3390/s19051146
- By:
- Publication type:
- Article
Pilot study of deep brain stimulation in refractory obsessive-compulsive disorder ethnic Chinese patients.
- Published in:
- Psychiatry & Clinical Neurosciences, 2012, v. 66, n. 4, p. 303, doi. 10.1111/j.1440-1819.2012.02352.x
- By:
- Publication type:
- Article
A rule-based approach to producing Z specifications from Jackson system development.
- Published in:
- International Journal of Intelligent Systems, 1998, v. 13, n. 7, p. 587, doi. 10.1002/(SICI)1098-111X(199807)13:7<587::AID-INT1>3.0.CO;2-G
- By:
- Publication type:
- Article