DOI:
10.1055/s-00034612
Yearbook of Medical Informatics
LinksClose Window
References
Raisaro JL, Tramer F, Ji Z, Bu D, Zhao Y, Carey K, Lloyd D. , et al.
Addressing Beacon re-identification attacks: quantification and mitigation of privacy risks.
J Am Med Inform Assoc 2017;
24 (04) 799-805
We do not assume any responsibility for the contents of the web pages of other providers.