Abstract is missing.
- A Research Roadmap for Healthcare IT Security Inspired by the PCAST Health Information Technology ReportMatthew D. Green, Aviel D. Rubin. [doi]
- Quickshear Defacing for NeuroimagesNakeisha Schimke, John Hale. [doi]
- Adaptive Security and Privacy for mHealth SensingShrirang Mare, Jacob Sorber, Minho Shin, Cory Cornelius, David Kotz. [doi]
- Controlled Dissemination of Electronic Medical RecordsGuido van 't Noordende. [doi]
- Take Two Software Updates and See Me in the Morning: The Case for Software Security Evaluations of Medical DevicesSteve Hanna, Rolf Rolles, Andres Molina-Markham, Pongsin Poosankam, Jeremiah Blocki, Kevin Fu, Dawn Song. [doi]
- Providing an Additional Factor for Patient Identification Based on Digital FingerprintGuy C. Hembroff, Xinli Wang, Sead Muftic. [doi]
- Persistent Security, Privacy, and Governance for Healthcare InformationW. Knox Carey, Jarl Nilsson, Steve Mitchell. [doi]
- Implantable Medical Device Communication Security: Pattern vs. Signal EncryptionFei Hu, Qi Hao, Marcin Lukowiak. [doi]
- Role Prediction Using Electronic Medical Record System AuditsWen Zhang, Carl A. Gunter, David M. Liebovitz, Jian Tian. [doi]
- Audit Mechanisms for Privacy Protection in Healthcare EnvironmentsJeremiah Blocki, Nicolas Christin, Anupam Datta, Arunesh Sinha. [doi]
- Exposing Privacy Concerns in mHealthAarathi Prasad, Jacob Sorber, Timothy Stablein, Denise Anthony, David Kotz. [doi]
- Who Does the Autopsy? Criminal Implications of Implantable Medical DevicesMarc Goodman. [doi]
- Context-Aware Anomaly Detection for Electronic Medical Record SystemsXiaowei Li 0003, Yuan Xue, You Chen, Bradley Malin. [doi]