Authentication enhancement for medical data centers
| Main Authors: | Hameed, Shihab A., Badurik, Waleed A. |
|---|---|
| Format: | Book Chapter |
| Language: | English |
| Published: |
IIUM Press
2011
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/21434/ http://irep.iium.edu.my/21434/1/Chapter_28.pdf |
Similar Items
Fundamental to medical data centers
by: Hameed, Shihab A., et al.
Published: (2011)
by: Hameed, Shihab A., et al.
Published: (2011)
Integrated authentication model: face verification
by: Hameed, Shihab A., et al.
Published: (2011)
by: Hameed, Shihab A., et al.
Published: (2011)
Face verification : an introduction
by: Hameed, Shihab A., et al.
Published: (2011)
by: Hameed, Shihab A., et al.
Published: (2011)
Introduction to fingerprint verification
by: Hameed, Shihab A., et al.
Published: (2011)
by: Hameed, Shihab A., et al.
Published: (2011)
SMS and MMS to enhance an integrated medical emergency model for malaysia
by: Hameed, Shihab A.
Published: (2010)
by: Hameed, Shihab A.
Published: (2010)
Enhanced LSB watermarking methods based on scanning patterns for authentication of medical images
by: Syifak Izhar, Hisham
Published: (2016)
by: Syifak Izhar, Hisham
Published: (2016)
Mobile web for integrated medical emergency model
by: Hameed, Shihab A.
Published: (2010)
by: Hameed, Shihab A.
Published: (2010)
Medical, healthcare, and emergency model : Mobile web to enhance patients’ facilities
by: Hameed, Shihab A., et al.
Published: (2010)
by: Hameed, Shihab A., et al.
Published: (2010)
Confidentiality to service medical emergency model
by: Hameed, Shihab A., et al.
Published: (2011)
by: Hameed, Shihab A., et al.
Published: (2011)
A model for ensuring data confidentiality: In healthcare and medical emergency
by: Hameed, Shihab A., et al.
Published: (2011)
by: Hameed, Shihab A., et al.
Published: (2011)
User-centered evaluation of privacy models for protecting personal medical information
by: Samsuri, Suhaila, et al.
Published: (2011)
by: Samsuri, Suhaila, et al.
Published: (2011)
A watermarking authentication system for medical images
by: Zeki, Akram M., et al.
Published: (2011)
by: Zeki, Akram M., et al.
Published: (2011)
Car monitoring, alerting and tracking model: enhancement with mobility and database facilities
by: Hameed, Shihab A., et al.
Published: (2010)
by: Hameed, Shihab A., et al.
Published: (2010)
Digital watermarking for medical image authentication
by: Noor Aqilah, Abdul Halim
Published: (2019)
by: Noor Aqilah, Abdul Halim
Published: (2019)
Three layer authentications with a spiral block mapping to prove authenticity in medical images
by: Ernawan, Ferda, et al.
Published: (2022)
by: Ernawan, Ferda, et al.
Published: (2022)
Harmful data factors that affect Internet's users in educational industry
by: Hameed, Shihab A.
Published: (2011)
by: Hameed, Shihab A.
Published: (2011)
Ethical values to enhance higher education for computing
by: Hameed, Shihab A.
Published: (2014)
by: Hameed, Shihab A.
Published: (2014)
Interactive web-based model for medical emergency
by: Hameed, Shihab A., et al.
Published: (2011)
by: Hameed, Shihab A., et al.
Published: (2011)
Electronic patient medical record to facilitate patient monitoring
by: Hameed, Shihab A., et al.
Published: (2011)
by: Hameed, Shihab A., et al.
Published: (2011)
A source authentication and data confidentiality scheme for multicast networks
by: Benmachiche, Abderrahim, et al.
Published: (2016)
by: Benmachiche, Abderrahim, et al.
Published: (2016)
Brain tumor data collection and analysis for developing tumor growth model
by: Hameed, Shihab A.
Published: (2013)
by: Hameed, Shihab A.
Published: (2013)
Region and active contour-based segmentation technique for
medical and weak-edged images
by: Aboaba, Abdulfattah A., et al.
Published: (2015)
by: Aboaba, Abdulfattah A., et al.
Published: (2015)
Improving software testing by using statictical methods to general multi-structures test data
by: Hameed, Shihab A.
Published: (2011)
by: Hameed, Shihab A.
Published: (2011)
Metrics for computing performance of data center for instigating Energy Efficient Data center
by: Shah, Asadullah
Published: (2014)
by: Shah, Asadullah
Published: (2014)
An efficient emergency, healthcare, and medical information system
by: Hameed, Shihab A., et al.
Published: (2008)
by: Hameed, Shihab A., et al.
Published: (2008)
Authentication System for Medical Images Using Hilbert Numbering
by: Syifak Izhar, Hisham, et al.
Published: (2014)
by: Syifak Izhar, Hisham, et al.
Published: (2014)
ICT and environmental problem
by: Hameed, Shihab A.
Published: (2011)
by: Hameed, Shihab A.
Published: (2011)
Hajj and information technologies: analytical studies
by: Hameed, Shihab A.
Published: (2011)
by: Hameed, Shihab A.
Published: (2011)
Framework for comprehensive Hajj model with ICT
by: Hameed, Shihab A.
Published: (2011)
by: Hameed, Shihab A.
Published: (2011)
Computers and electronic devices waste: fundamental facts
by: Hameed, Shihab A.
Published: (2011)
by: Hameed, Shihab A.
Published: (2011)
Computers and electronic devices waste: analysis and solution
by: Hameed, Shihab A.
Published: (2011)
by: Hameed, Shihab A.
Published: (2011)
Strategy for green ICT: an Islamic view
by: Hameed, Shihab A.
Published: (2011)
by: Hameed, Shihab A.
Published: (2011)
Green ICT for better human life
by: Hameed, Shihab A.
Published: (2016)
by: Hameed, Shihab A.
Published: (2016)
Harmful data that affect ethical, religious, and social values of Internet users in education process
by: Hameed, Shihab A.
Published: (2011)
by: Hameed, Shihab A.
Published: (2011)
Measuring efficiency of tier level data centers to implement green energy efficient data centers
by: Uddin, Mueen, et al.
Published: (2013)
by: Uddin, Mueen, et al.
Published: (2013)
Secured Communication Mechanism For Message Authentication And Data Confidentiality In Secs/Gem Protocol
by: Jaisan S M, Ashish
Published: (2024)
by: Jaisan S M, Ashish
Published: (2024)
Intelligent generator for semi-actual data
by: Hameed, Shihab A., et al.
Published: (2011)
by: Hameed, Shihab A., et al.
Published: (2011)
Service quality as an antecedent in enhancing customers’
behavioural intentions: a case study of Malaysian army medical
centers
by: Azman Ismail,, et al.
Published: (2016)
by: Azman Ismail,, et al.
Published: (2016)
Numbering with Spiral Pattern to Prove Authenticity and Integrity in Medical Images
by: Syifak Izhar, Hisham, et al.
Published: (2016)
by: Syifak Izhar, Hisham, et al.
Published: (2016)
HILBERT-LSB-C as Authentication System for Color Medical Images
by: Syifak Izhar, Hisham, et al.
Published: (2015)
by: Syifak Izhar, Hisham, et al.
Published: (2015)
Similar Items
-
Fundamental to medical data centers
by: Hameed, Shihab A., et al.
Published: (2011) -
Integrated authentication model: face verification
by: Hameed, Shihab A., et al.
Published: (2011) -
Face verification : an introduction
by: Hameed, Shihab A., et al.
Published: (2011) -
Introduction to fingerprint verification
by: Hameed, Shihab A., et al.
Published: (2011) -
SMS and MMS to enhance an integrated medical emergency model for malaysia
by: Hameed, Shihab A.
Published: (2010)