81
TITLE: FROM LEGISLATION TO PRACTICE <i>A Case Study of Break the Glass in Healthcare</i>
AUTHORS: Farinha, P ; Cruz Correia, R ; Antunes, L ; Almeida, F; Ferreira, A ;
PUBLISHED: 2010, SOURCE: 3rd International Conference on Health Informatics (HEALTHINF 2010) in HEALTHINF 2010: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON HEALTH INFORMATICS
INDEXED IN: Scopus WOS DBLP
82
TITLE: Grounding information security in healthcare
AUTHORS: Ferreira, A ; Antunes, L ; Chadwick, D; Correia, R ;
PUBLISHED: 2010, SOURCE: INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS, VOLUME: 79, ISSUE: 4
INDEXED IN: Scopus WOS DBLP CrossRef: 15
83
TITLE: Information measures for infinite sequences  Full Text
AUTHORS: Antunes, L ; Souto, A ;
PUBLISHED: 2010, SOURCE: THEORETICAL COMPUTER SCIENCE, VOLUME: 411, ISSUE: 26-28
INDEXED IN: Scopus WOS DBLP CrossRef: 1
IN MY: ORCID
84
TITLE: Password sharing and how to reduce it
AUTHORS: Ferreira, A ; Correia, R ; Chadwick, DW; Santos, H; Gomes, R; Reis, D; Antunes, L ;
PUBLISHED: 2010, SOURCE: Certification and Security in Health-Related Web Applications: Concepts and Solutions
INDEXED IN: Scopus CrossRef: 2
85
TITLE: Accessing an existing virtual electronic patient record with a secure wireless architecture
AUTHORS: Ferreira, A ; Barreto, L. ; Brandao, P ; Correia, R ; Sargento, S ; Antunes, L ;
PUBLISHED: 2009, SOURCE: Mobile Health Solutions for Biomedical Applications
INDEXED IN: Scopus CrossRef
86
TITLE: Commitment and authentication systems  Full Text
AUTHORS: Pinto, A ; Souto, A ; Matos, A ; Antunes, L ;
PUBLISHED: 2009, SOURCE: DESIGNS CODES AND CRYPTOGRAPHY, VOLUME: 53, ISSUE: 3
INDEXED IN: Scopus WOS DBLP CrossRef
IN MY: ORCID
87
TITLE: Commitment and Authentication Systems
AUTHORS: Pinto, A ; Souto, A ; Matos, A ; Antunes, L ;
PUBLISHED: 2009, SOURCE: 2nd International Conference on Information Theoretic Security in INFORMATION THEORETIC SECURITY, VOLUME: 4883
INDEXED IN: Scopus WOS DBLP CrossRef
88
TITLE: Cryptographic Security of Individual Instances  Full Text
AUTHORS: Antunes, L ; Laplante, S; Pinto, A ; Salvador, L;
PUBLISHED: 2009, SOURCE: 2nd International Conference on Information Theoretic Security in INFORMATION THEORETIC SECURITY, VOLUME: 4883
INDEXED IN: Scopus WOS DBLP CrossRef: 3
IN MY: ORCID
89
TITLE: Depth as Randomness Deficiency  Full Text
AUTHORS: Antunes, L ; Matos, A ; Souto, A ; Vitányi, P;
PUBLISHED: 2009, SOURCE: 3rd Computability in Europe Conference 2007 in THEORY OF COMPUTING SYSTEMS, VOLUME: 45, ISSUE: 4
INDEXED IN: Scopus WOS DBLP CrossRef: 10
IN MY: ORCID
90
TITLE: How to securely break into RBAC: the BTG-RBAC model
AUTHORS: Ferreira, A ; Chadwick, D; Farinha, P ; Correia, R ; Zao, GS; Chilro, R; Antunes, L ;
PUBLISHED: 2009, SOURCE: 25th Annual Computer Security Applications Conference in 25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE
INDEXED IN: Scopus WOS DBLP CrossRef: 64
Page 9 of 12. Total results: 113.