Patient confidential information
Hiding Patient Confidential Information in ECG Signal Using DWT Technique
6
An Enhanced Cryptography for ECG Steganography to Satisfy HIPAA Privacy and Security Regulation for Bio-Medical Datas
8
An approach of ECG Steganography to Secure the Patient's Confidential Information
5
500281_CP1631B_MICROM_Dec75.pdf
15
Secure Communication in Decentralized Disruption Tolerant Military Networks Using CP-ABE and 2PC Protocol
5
Teacher involvement in the development of confidential assessment materials. Consultation
17
Journalists and Confidential Sources
13
Confidential Assets on MimbleWimble
9
Confidential State Verification for the Delegated Cloud Jobs with Confidential Audit Log
13
Loud Talk About a Quiet Issue: The International Atomic Energy Agency's Struggle to Maintain the Confidentiality of Information Gained in Nuclear Facility Inspections
32
State v. Reesman: Totality of the Circumstances Or a Recipe for Mulligan Stew?
29
MATHEMATICAL MODELS OF THREATS OF UNAUTHORIZED ACCESS TO SENSITIVE INFORMATION OF MOBILE NETWORK SUBSCRIBERS AND MEASURES TO PROTECT MOBILE SYSTEM
8
Phish Guard: Detecting Phishing Sites Using Fundamental Visual Similarities
6
Health research access to personal confidential data in England and Wales: assessing any gap in public attitude between preferable and acceptable models of consent
24
A CAMEL rating's shelf life
24
An Unreasonable Ban on Reasonable Competition: The Legal Profession’s Protectionist Stance Against Noncompete Agreements Binding In-House Counsel
47
A Secure Data Hiding Technique Using Video Steganography
9
Authentication of Users by Typing Pattern: A Review
5
Women and Children First, but Only If the Men are Union Members: Hiring Halls and Delinquent Child-Supporters
95
Title: CYBER SECURITY SYSTEMS USING BIG DATA
5