It is widely known that there is a lot of room for improvement in the Slovenian health care system. A lot could be done about long queues, which are a consequence of poor communication between various branches of medical profession. It often occurs that patient must take the same test several times because doctors do not have the information obtained from the previous studies. The probles is not complex and can be solved in a number of ways. This thesis focuses on one of these solutions through the development of a mobile application for Android that enables a secure transfer of digital medical contents with cryptography. It also covers the development of a web application that will be used by users of the mobile application. The solution l...
The advent of smartphones dramatically changed the way of communication, computation, and the model ...
Ovaj završni rad opisuje matematičke osnove kriptografije i njene povijesti. Pošiljatelj šifrira por...
Bachelor’s thesis describes the basics of authentication methods by knowledge, used authentication t...
Usage of mobile applications and wireless networks is growing rapidly at different sectors in the wo...
Nowadays, medical applications (apps) have become a rapidly growing and basic tool in medical educat...
The paper deals with a possible SOA based m-healthcare online system with secure mobile communicatio...
In the growing industry of mHealth, mobile medical apps are becoming a popular mechanism for healthc...
Mobile medical apps are a growing mechanism for healthcare delivery through an increasingly complex ...
Cílem této práce je návrh a implementace zabezpečeného mobilního spojení s experimentálním nemocničn...
Many of the countries in the world are having the doctor to patient ratio far below than the prescri...
The aim of this bachelor's thesis is to design and implement a mobile application for instant messag...
Many different applications in health care have some common characteristics. We used these char-acte...
The thesis deals with security of the Android operating system, both general security features and o...
The thesis deals with safe files transfer among mobile devices . The first part of this thesis is t...
This master's thesis deals with application design and implementation of secured communication betwe...
The advent of smartphones dramatically changed the way of communication, computation, and the model ...
Ovaj završni rad opisuje matematičke osnove kriptografije i njene povijesti. Pošiljatelj šifrira por...
Bachelor’s thesis describes the basics of authentication methods by knowledge, used authentication t...
Usage of mobile applications and wireless networks is growing rapidly at different sectors in the wo...
Nowadays, medical applications (apps) have become a rapidly growing and basic tool in medical educat...
The paper deals with a possible SOA based m-healthcare online system with secure mobile communicatio...
In the growing industry of mHealth, mobile medical apps are becoming a popular mechanism for healthc...
Mobile medical apps are a growing mechanism for healthcare delivery through an increasingly complex ...
Cílem této práce je návrh a implementace zabezpečeného mobilního spojení s experimentálním nemocničn...
Many of the countries in the world are having the doctor to patient ratio far below than the prescri...
The aim of this bachelor's thesis is to design and implement a mobile application for instant messag...
Many different applications in health care have some common characteristics. We used these char-acte...
The thesis deals with security of the Android operating system, both general security features and o...
The thesis deals with safe files transfer among mobile devices . The first part of this thesis is t...
This master's thesis deals with application design and implementation of secured communication betwe...
The advent of smartphones dramatically changed the way of communication, computation, and the model ...
Ovaj završni rad opisuje matematičke osnove kriptografije i njene povijesti. Pošiljatelj šifrira por...
Bachelor’s thesis describes the basics of authentication methods by knowledge, used authentication t...