{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T08:52:07Z","timestamp":1762505527493},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[1998,2,1]],"date-time":"1998-02-01T00:00:00Z","timestamp":886291200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Digit Imaging"],"published-print":{"date-parts":[[1998,2]]},"DOI":"10.1007\/bf03168723","type":"journal-article","created":{"date-parts":[[2009,10,26]],"date-time":"2009-10-26T04:55:10Z","timestamp":1256532910000},"page":"33-44","source":"Crossref","is-referenced-by-count":13,"title":["Security for the digital information age of medicine: Issues, applications, and implementation"],"prefix":"10.1007","volume":"11","author":[{"given":"Michael A.","family":"Epstein","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Michael S.","family":"Pasieka","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"William P.","family":"Lord","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Stephen T. C.","family":"Wong","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Nicholas J.","family":"Mankovich","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"BF03168723_CR1","first-page":"1","volume-title":"Proceedings of the 1996 Annual HIMSS Conference","author":"S Lafrance","year":"1996","unstructured":"Lafrance S, Krok S, Moore R, et al: Security vs. Access: A New Health Care Dilemma, in Proceedings of the 1996 Annual HIMSS Conference. Chicago, IL, Heathcare Information and Management Systems Society, 1996, pp 1\u20139"},{"key":"BF03168723_CR2","first-page":"410","volume":"3","author":"S Wong","year":"1996","unstructured":"Wong S: A Cryptologic Based Trust Center for Medical Images. JAMIA 3:410\u2013421, 1996","journal-title":"JAMIA"},{"key":"BF03168723_CR3","doi-asserted-by":"crossref","first-page":"771","DOI":"10.1148\/radiology.194.3.7862977","volume":"194","author":"J Smith","year":"1995","unstructured":"Smith J: Authentication of Digital Medical Images with Digital Signature Technology. Radiology 194:771\u2013774, 1995","journal-title":"Radiology"},{"key":"BF03168723_CR4","unstructured":"McCurley K: Protecting Privacy and Information Integrity of Computerized Medical Information. http:\/\/www.cs.sandia.gov\/\u2248mccurly\/health.html"},{"key":"BF03168723_CR5","volume-title":"Applied Cryptography","author":"B Schneier","year":"1996","unstructured":"Schneier B: Applied Cryptography (ed 2) New York, NY, John Wiley & Sons, 1996","edition":"ed 2"},{"key":"BF03168723_CR6","volume-title":"Cryptography\u2014Theory and Practice","author":"D Stinson","year":"1995","unstructured":"Stinson D: Cryptography\u2014Theory and Practice. Boca Raton, FL, CRC Press, 1995"},{"key":"BF03168723_CR7","unstructured":"Bach E, Bellouin S, Bemstein D: Cryptography-FAQ. http:\/\/www.cs.ruu.nl\/wais\/html\/na-dir\/cryptography-faq\/.html"},{"key":"BF03168723_CR8","first-page":"9","volume-title":"Handbook of Applied CRYPTOGRAPHY","author":"A Menezes","year":"1997","unstructured":"Menezes A, van Oorschot P, Vanstone S: Handbook of Applied CRYPTOGRAPHY, Boca Raton, FL, CRC Press, 1997, pp 9\u201310"},{"issue":"2","key":"BF03168723_CR9","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R Rivest","year":"1978","unstructured":"Rivest R, Shamir A, Adleman L: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM 21(2):120\u2013126, 1978","journal-title":"Communications of the ACM"},{"key":"BF03168723_CR10","first-page":"258","volume-title":"Applied Cryptography","author":"B Schneier","year":"1996","unstructured":"Schneier B: Applied Cryptography (ed 2). New York, NY, Wiley, 1996, pp 258","edition":"ed 2"},{"key":"BF03168723_CR11","unstructured":"SSL 3.0 specification. Netscape, Sunnyvale, CA. http:\/\/www.jp.netscape.com\/eng\/ss13\/,March 1996"},{"key":"BF03168723_CR12","unstructured":"JavaCard API Specification Version 1.0. Sun Microsystems Inc, Mountain View, CA. http:\/\/java.sun.com\/products\/commerce\/doc.javacard.ps, October 1996"},{"key":"BF03168723_CR13","first-page":"153","volume-title":"Applied Cryptography","author":"B Schneier","year":"1996","unstructured":"Schneier B: Applied Cryptography (ed 2), New York, NY, Wiley, 1996, pp 153","edition":"ed 2"},{"key":"BF03168723_CR14","volume-title":"Cryptography\u2019s Role in Securing the Information Society","author":"K Dam","year":"1996","unstructured":"Dam K, Lin H: Cryptography\u2019s Role in Securing the Information Society. Washington, DC, National Academy Press, 1996. http:\/\/www2.nas.edu\/cstbweb\/28e2.html (prepublication copy ed.)"},{"key":"BF03168723_CR15","unstructured":"Auston I, Humphreys B, Clayton P: Confidentiality of electronic health data: methods for protecting personally identifiable information. Washington, DC, National Library of Medicine, US Department of Health and Human Services. http:\/\/www.nlm.nih.gov\/pubs\/cbm\/confiden.html"},{"key":"BF03168723_CR16","first-page":"597","volume-title":"Applied Cryptography","author":"B Schneier","year":"1996","unstructured":"Schneier B: Applied Cryptography (ed 2). New York, NY, Wiley, 1996, pp 597\u2013618","edition":"ed 2"},{"key":"BF03168723_CR17","unstructured":"US Department of State: International Traffic in Arms Regulations (ITAR), 22 CFR 120\u2013130 (Office of Munitions Control, 1989)"},{"key":"BF03168723_CR18","volume-title":"Recommendation X.509, in The Directory-Authentication Framework","author":"Consultation Committee, International Telephone and Telegraph","year":"1989","unstructured":"Consultation Committee, International Telephone and Telegraph: Recommendation X.509, in The Directory-Authentication Framework. Geneva, Switzerland, International Telecommunications Union, 1989"},{"key":"BF03168723_CR19","unstructured":"Pollack A: Counterfeiters of a New Stripe Give Japan One More Worry: Fake Cards Thwart Efforts to End Pinball Scams. New York Times, Thursday June 20, 1996 (col. 2, pg. 1, sec. D)"},{"key":"BF03168723_CR20","first-page":"191","volume-title":"Applied Cryptography","author":"B Schneier","year":"1996","unstructured":"Schneier B: Applied Cryptography (ed 2) New York, NY, Wiley, 1996, pp 191\u2013193","edition":"ed 2"}],"container-title":["Journal of Digital Imaging"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF03168723.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/BF03168723\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF03168723","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T22:56:51Z","timestamp":1558479411000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BF03168723"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998,2]]},"references-count":20,"journal-issue":{"issue":"1","published-print":{"date-parts":[[1998,2]]}},"alternative-id":["BF03168723"],"URL":"https:\/\/doi.org\/10.1007\/bf03168723","relation":{},"ISSN":["0897-1889","1618-727X"],"issn-type":[{"value":"0897-1889","type":"print"},{"value":"1618-727X","type":"electronic"}],"subject":[],"published":{"date-parts":[[1998,2]]}}}