The following publications are possibly variants of this publication:
- Improving Patients Privacy with PseudonymizationThomas Neubauer, Bernhard Riedl. mie 2008: 691-696 [doi]
- A Secure e-Health Architecture based on the Appliance of PseudonymizationBernhard Riedl, Veronika Grascher, Thomas Neubauer. jsw, 3(2):23-32, 2008. [doi]
- Applying a Threshold Scheme to the Pseudonymization of Health DataBernhard Riedl, Veronika Grascher, Thomas Neubauer. prdc 2007: 397-400 [doi]
- Secure Access to Emergency Data in an e-Health ArchitectureBernhard Riedl, Oliver Jorns. iiwas 2007: 297-306
- Economic and Security Aspects of Applying a Threshold Scheme in e-HealthBernhard Riedl, Veronika Grascher, Mathias Kolb, Thomas Neubauer. IEEEares 2008: 39-46 [doi]
- A secure architecture for the pseudonymization of medical dataBernhard Riedl, Thomas Neubauer, Gernot Goluch, Oswald Boehm, Gert Reinauer, Alexander Krumboeck. IEEEares 2007: 318-324 [doi]