Author:
García Ismael Gutiérrez,Molinares Daladier Jabba,Naizir Ivan Molina
Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Computational Theory and Mathematics,Computer Networks and Communications
Reference21 articles.
1. Alhaqbani, B., Fidge, C.J.: Privacy-preserving electronic health record linkage using pseudonym identifiers. In: 10th IEEE international conference on e-health networking, applications and services. HealthCom, Singapore, Singapore, pp 108–117 (2008)
2. Baker, D.: The joint commission’s 2017 national patient safety goals, Available from:
https://www.jointcommission.org/npsg_presentation/
, (accessed 17 July 2017) (2017)
3. Bernstein, D., Lange, T.: Safecurves, Available from:
http://safecurves.cr.yp.to
, (accessed 17 July 2017) (2014)
4. Bosma, W., Cannon, J., Playoust, C.: The Magma algebra system. I. The user language. J. Symbolic Comput. 24(3-4), 235–265 (1997). Computational algebra and number theory (London, 1993). MR MR1484478
5. Dewaghe, L.: Remarks on the schoof-elkies-atkin algorithm. Math. Comput. American Math. Soc. 67(223), 1247–1252 (1998)