×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
上海电子信息职业... [254]
内容类型
期刊论文 [186]
会议论文 [64]
学位论文 [4]
发表日期
2018 [6]
2017 [9]
2016 [10]
2015 [5]
2014 [12]
2013 [15]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共254条,第1-10条
帮助
限定条件
专题:上海电子信息职业技术学院
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Designing Effective Visual Interactive Systems despite Sparse Availability of Domain Information.
期刊论文
IEEE Computer Graphics & Applications, 2018, 卷号: Vol.38 No.5, 页码: 54-69
作者:
Kossurok,Thomas
;
Brandt,Franz-Josef
;
Scheler,Inga
;
Horst,Michael
;
Freund,Alina
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/24
INFORMATION
visualization
*VISUALIZATION
*DATA
security
*COMPUTER
software
*ELECTRONIC
data
processing
Infrastructures for healthcare: From synergy to reverse synergy
期刊论文
Health Informatics Journal, 2018, 卷号: Vol.24 No.1, 页码: 43-53
作者:
PernilleBjørn
;
MikkelHvidAmstrup
;
PeterMørck
;
TueOddLanghoff
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2019/12/24
data
security
and
confidentiality
databases
and
data
mining
electronic
health
records
information
and
knowledge
management
information
infrastructures
primary
care
quality
control
sustainability
synergy
Artificial Noise-Aided User Scheduling From the Perspective of Secrecy Outage Probability.
期刊论文
IEEE Transactions on Vehicular Technology, 2018, 卷号: Vol.67 No.8, 页码: 7816-7820
作者:
Kim,SuMin
;
Sung,DanKeun
;
Bang,Inkyu
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/12/24
DATA
transmission
systems
*NOISE
generators
*WIRELESS
communication
systems
*INFORMATION-theoretic
security
*WIRETAPPING
*RANDOM
noise
theory
Perspectives on the Future of the Profession: Looking Forward, Then and NOW.
期刊论文
Educause Review, 2018, 卷号: Vol.53 No.5, 页码: 40-48
作者:
Mitchell,Cindy
;
Pitt,SharonP.
;
Rowe,Theresa
;
Garrett,P.B.
;
Francis,Paige
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/24
INFORMATION
technology
*INFORMATION
storage
&
retrieval
system
security
measures
*ELECTRONIC
data
processing
*TECHNOLOGICAL
innovations
*STEAM
engines
Medical practices must be proactive with cybersecurity.
期刊论文
Urology Times, 2018, 卷号: Vol.46 No.4, 页码: 38-39
作者:
FISHER,DYLAN
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2019/12/24
DATA
security
*MEDICAL
records
*MANAGEMENT
of
medical
records
*PRACTICE
of
medicine
*MEDICAL
societies
*RISK
assessment
*INFORMATION
literacy
*ELECTRONIC
health
records
*VULNERABILITY
MORAL
&
ethical
aspects
Documents signed or executed with electronic signatures in English law.
期刊论文
Computer Law & Security Review, 2018, 卷号: Vol.34 No.4, 页码: 933-945
作者:
Mason,Stephen
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/12/24
DOCUMENTATION
*DATA
protection
laws
*INFORMATION
technology
laws
*ACCESS
control
of
electronic
records
*ELECTRONIC
records
LAW
&
legislation
SECURITY
measures
A secure framework and related protocols for ubiquitous access to electronic health records using Java sim cards
学位论文
: Queensland University of Technology, 2017
作者:
Hassanzadeh,Reza
收藏
  |  
浏览/下载:30/0
  |  
提交时间:2019/12/24
electronic
health
records
information
security
data
privacy
Java
SIM
cards
next
generation
networks
smart
phones
near
field
communication
biometric
identification
public
key
infrastructure
Medical Privacy and Security
期刊论文
The Oxford Handbook of U.S. Health Law, 2017
作者:
SharonaHoffman
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/12/24
medical
privacy
security
electronic
health
records
computerized
health
information
big
data
confidentiality
medical
records
privacy
laws
Health
Insurance
Portability
and
Accountability
Act
Enforcing Differential Privacy for Shared Collaborative Filtering
期刊论文
IEEE Access, 2017, 卷号: Vol.5, 页码: 35-49
作者:
JingBi
;
QingWang
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2019/12/24
Data
sharing
Electronic
commerce
Computer
security
Online
services
Information
technology
Privacy
Filters
security
and
privacy
protection
Data
sharing
electronic
commerce
online
information
service
Time For Organizations To Get Serious About Governance.
期刊论文
Credit Control, 2017, 卷号: Vol.38 No.1-2, 页码: 49-51
作者:
Larrivee,Bob
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/12/24
Data
Data
breaches
Data
deluge
Electronic
records
Governance
Information
IT
security
©版权所有 ©2017 CSpace - Powered by
CSpace