Login / Signup
A Secure e-Health Architecture based on the Appliance of Pseudonymization.
Bernhard Riedl
Veronika Grascher
Thomas Neubauer
Published in:
J. Softw. (2008)
Keyphrases
</>
security architecture
management system
neural network
application level
digital rights management
information sharing
network architecture
security issues
security mechanisms
layered architecture
home appliances