mi2b2
Space shortcuts
Space Tools

Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

If you are looking for information on how to set up encryption key and configure other download settings in mi2b2, please refer to this page instead.

In this document, when we say "random" or "randomly", we mean "pseudo-random" and "pseudo-randomly", that is, the randomness is produced by a deterministic algorithm to simulate true randomness, which can only be reliably obtained via observing natural phenomena.

...

A key (randomly generated via the key-generation mechanism or user-provided) and the initialization vector are then used in the encryption process.

...

Users have two ways of obtaining a key for encryption (see Key Dialog). The first is to generate a random key automatically. mi2b2 will use the build-in Java cryptographic methods to generate a key and write that key to a file. The file then can be shared among different users to open all images encrypted with that key.

...

Section
Column

Last Page (Managing Remote Cache)

Column
Panel
  1. Quick Start
  2. Searching for and Requesting DICOM Studies
  3. Downloading Studies
  4. Managing Remote Cache
  5. Sorting and Filtering
  6. Encryption
  7. Frequently Asked Questions (FAQs)