Author of the publication

Methods of Responding to Healthcare Security Incidents.

, , , , , and . MedInfo, volume 52 of Studies in Health Technology and Informatics, page 1138-1142. IOS Press, (1998)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

New technique for the representation of access network performance., , and . Comput. Commun., 19 (6-7): 564-570 (1996)Fast heuristics for practical TDM network design., , and . Comput. Commun., 20 (7): 521-527 (1997)A security framework for online distance learning and training., , , , , , and . Internet Res., 8 (3): 236-242 (1998)The Quadratic Residue Cipher and Some Notes on Implementation., , and . Cryptologia, 17 (3): 264-282 (1993)Baseline Security Guidelines for Health Care Management., , and . Data Security for Health Care (1), volume 31 of Studies in Health Technology and Informatics, IOS Press, (1996)Traffic profiles and application signatures., , and . Comput. Commun., 22 (12): 1123-1126 (1999)Applications of keystroke analysis for improved login security and continuous user authentication., , , and . SEC, volume 54 of IFIP Conference Proceedings, page 283-294. Chapman & Hall, (1996)Strategies for content migration on the World Wide Web., , , , , and . Internet Res., 9 (1): 25-34 (1999)Methods of Responding to Healthcare Security Incidents., , , , , and . MedInfo, volume 52 of Studies in Health Technology and Informatics, page 1138-1142. IOS Press, (1998)Approaches to Security in Healthcare Multimedia Systems., , , , and . Communications and Multimedia Security, volume 70 of IFIP Conference Proceedings, page 25-36. Chapman & Hall, (1996)