Mostrando 61 - 80 Resultados de 258 Para Buscar '"pseudonym"', tiempo de consulta: 0.14s Limitar resultados
  1. 61
    “…Methods Here we present a narrative case report of a 16-year-old boy, ‘Wati’ (pseudonym), who lived in rural Malawi and took his own life after gambling and losing money that did not belong to him. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  2. 62
    “…We conducted the study at ‘Restwood’ (pseudonym) nursing home because the Director of Care engaged actively in the study and TREC data showed that this site differed on some areas from other nursing homes in the province. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  3. 63
    “…Her case, detailed under the pseudonym Ana Maria, presents unique challenges related to the fulfillment of sexual and reproductive rights due to the restrictive social norms related to sexual health, ubiquitous violence against women (VAW) and the total ban on abortion in Nicaragua. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  4. 64
    “…The first author collected data at the primary health care center La Virgen (pseudonym) through the review of documents, observation and interviews with health systems’ managers, team members, women patients, and members of external services. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  5. 65
  6. 66
    “…NHash has a unique set of properties: (1) it is a pseudonym serving the purpose of linking research data about a study participant for research purposes; (2) it can be generated automatically in a completely distributed fashion with virtually no risk for identifier collision; (3) it incorporates a set of cryptographic hash functions based on N-grams, with a combination of additional encryption techniques such as a shift cipher; (d) it is validatable (error tolerant) in the sense that inadvertent edit errors will mostly result in invalid identifiers. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  7. 67
  8. 68
  9. 69
    “…OBJECTIVE: Our objective was to propose a novel approach to pseudonymization based on public-private key cryptography that allows (1) decentralized patient-driven creation and maintenance of pseudonyms, (2) 1-time pseudonymization of each data record, and (3) grouping of patient data records even without knowing the pseudonymization key. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  10. 70
  11. 71
    “…The form of pseudonymisation that is used in this Parkinson project is based on cryptographic techniques and is ‘polymorphic’: it gives each participating research group its own ‘local’ pseudonyms. Still, the system is globally consistent, in the sense that if one research group adds data to PPP under its own local pseudonyms, the data become available for other groups under their pseudonyms. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  12. 72
  13. 73
    por Sanger, Gareth J.
    Publicado 2022
    “…Although widely present among mammals, it is generally accepted that in rodents the genes for motilin and/or its receptor have undergone pseudonymization, so exogenous motilin cannot function. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  14. 74
    “…A growing framework of legal and ethical requirements limit scientific and commercial evaluation of personal data. Typically, pseudonymization, encryption, or methods of distributed computing try to protect individual privacy. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  15. 75
    “…In a biometric authentication system using protected templates, a pseudonymous identifier is the part of a protected template that can be directly compared. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  16. 76
    “…This paper demonstrates how blockchain technologies can be used to further all three of the bioethical principles underlying consent requirements: the autonomy of patients, by giving them much greater control over their data; beneficence, by greatly facilitating medical research efficiency and by reducing biases and opportunities for errors; and justice, by enabling patients with rare or under-researched conditions to pseudonymously aggregate their data for analysis. Finally, we coin and describe the novel concept of prosent, by which we mean the blockchain-enabled ability of all stakeholders in the research process to pseudonymously and proactively consent to data release or exchange under specific conditions, such as trial completion.…”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  17. 77
    “…Finally, our proposed lightweight RFID protocol ensured strong security against known attacks and protected patient privacy using pseudonyms instead of real IDs.…”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  18. 78
    por Paterson, Grace
    Publicado 2020
    “…The account is used to examine two important subclasses of anonymized speech: speech using pseudonyms, and speech anonymized in a specifically communicative manner. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  19. 79
  20. 80
    “…Specifically, our work is based on a recently established generic data management concept, for which we designed and implemented a web-based software framework that integrates data analysis, visualization as well as computer simulation and model prediction with audit trail functionality and a regulation-compliant pseudonymization service. Within the front-end application, we established two tailored views: a clinical (i.e., treatment context) perspective focusing on patient-specific data visualization, analysis and outcome prediction and a research perspective focusing on the exploration of pseudonymized data. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
Herramientas de búsqueda: RSS