共 29 条
[3]
Chen HS., 2019, BIOMED J SCI TECH RE, V20, P15017, DOI [10.1016/10.26717/BJSTR.2019.20.003448, DOI 10.26717/BJSTR.2019.20.003448, 10.26717/bjstr.2019.20.003448]
[5]
Choudhari R., 2023, Patient Consent Management & Blockchain
[6]
Dawoud M, 2017, 2017 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), P861, DOI 10.1109/UBMK.2017.8093549
[7]
Hybrid image encryption scheme for secure E-health systems
[J].
NETWORK MODELING AND ANALYSIS IN HEALTH INFORMATICS AND BIOINFORMATICS,
2021, 10 (01)
[8]
Detection of Insider Attacks in Cloud based e-Healthcare Environment
[J].
2014 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY (ICIT),
2014,
:195-200
[10]
Giannopoulou A., 2021, Soc. Sci. Res. Netw.