e.g. mhealth
Search Results (1 to 4 of 4 Results)
Download search results: CSV END BibTex RIS
Skip search results from other journals and go to results- 2 Journal of Medical Internet Research
- 1 JMIR Formative Research
- 1 JMIR Human Factors
- 0 Medicine 2.0
- 0 Interactive Journal of Medical Research
- 0 iProceedings
- 0 JMIR Research Protocols
- 0 JMIR Medical Informatics
- 0 JMIR Public Health and Surveillance
- 0 JMIR mHealth and uHealth
- 0 JMIR Serious Games
- 0 JMIR Mental Health
- 0 JMIR Rehabilitation and Assistive Technologies
- 0 JMIR Preprints
- 0 JMIR Bioinformatics and Biotechnology
- 0 JMIR Medical Education
- 0 JMIR Cancer
- 0 JMIR Challenges
- 0 JMIR Diabetes
- 0 JMIR Biomedical Engineering
- 0 JMIR Data
- 0 JMIR Cardio
- 0 Journal of Participatory Medicine
- 0 JMIR Dermatology
- 0 JMIR Pediatrics and Parenting
- 0 JMIR Aging
- 0 JMIR Perioperative Medicine
- 0 JMIR Nursing
- 0 JMIRx Med
- 0 JMIRx Bio
- 0 JMIR Infodemiology
- 0 Transfer Hub (manuscript eXchange)
- 0 JMIR AI
- 0 JMIR Neurotechnology
- 0 Asian/Pacific Island Nursing Journal
- 0 Online Journal of Public Health Informatics
- 0 JMIR XR and Spatial Computing (JMXR)

CDS: clinical decision support; CP-ABE: ciphertext-policy attribute–based encryption. EHR: electronic health record; OMOP: Observational Medical Outcomes Partnership; RDF: resource description framework.
The local EHR knowledge graph component offers the capability to leverage local EHR data for semantic reasoning and CDS generation. This component has been adapted from our previous study [18].
J Med Internet Res 2024;26:e54263
Download Citation: END BibTex RIS

Thus, besides using encryption and access control to secure the data in the cloud, it is necessary to use modern techniques to adequately address all the requirements in acute care.
Advanced Secure Cloud Encrypted Platform for Internationally Orchestrated Solutions in Health Care (ASCLEPIOS) is a project funded by the Horizon 2020 program [21].
JMIR Form Res 2022;6(12):e40061
Download Citation: END BibTex RIS

For most nontechnical participants, there was a common belief that encryption is being performed by the institution behind the scenes. For example, encrypted email is common within their organization. Encrypted data are better protected than unencrypted data. Encryption is considered important, especially for data that are being transferred between institutions. It was mentioned that encrypted data are considered to be safer than unencrypted data; however, encryption “cannot be trusted 100%” (Res12).
JMIR Hum Factors 2021;8(3):e21810
Download Citation: END BibTex RIS

The combination of secure multiparty computation and homomorphic encryption was proposed to overcome their respective overheads and technical limitations; we refer to it as multiparty homomorphic encryption [43-46]. Multiparty homomorphic encryption enables flexible secure processing by efficiently transitioning between encrypted local computation, performed with homomorphic encryption, and interactive protocols (secure multiparty computation).
J Med Internet Res 2021;23(2):e25120
Download Citation: END BibTex RIS