Sign in

A secure protocol for protecting the identity of providers when disclosing data for disease surveillance.

Khaled El EmamJun HuJay MercerLiam PeytonMurat KantarciogluBradley A. MalinDavid L. BuckeridgeSaeed SametCraig Earle
Published in: J. Am. Medical Informatics Assoc. (2011)
Keyphrases
  • data structure
  • databases
  • computer vision
  • information security
  • security analysis
  • data protection