These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

134 related articles for article (PubMed ID: 18431451)

  • 21. A joint signal processing and cryptographic approach to multimedia encryption.
    Mao Y; Wu M
    IEEE Trans Image Process; 2006 Jul; 15(7):2061-75. PubMed ID: 16830924
    [TBL] [Abstract][Full Text] [Related]  

  • 22. DNA based random key generation and management for OTP encryption.
    Zhang Y; Liu X; Sun M
    Biosystems; 2017 Sep; 159():51-63. PubMed ID: 28733249
    [TBL] [Abstract][Full Text] [Related]  

  • 23. Molecular solutions for the subset-sum problem on DNA-based supercomputing.
    Chang WL; Ho MS; Guo M
    Biosystems; 2004 Feb; 73(2):117-30. PubMed ID: 15013224
    [TBL] [Abstract][Full Text] [Related]  

  • 24. Approach to design neural cryptography: a generalized architecture and a heuristic rule.
    Mu N; Liao X; Huang T
    Phys Rev E Stat Nonlin Soft Matter Phys; 2013 Jun; 87(6):062804. PubMed ID: 23848726
    [TBL] [Abstract][Full Text] [Related]  

  • 25. The surface-based approach for DNA computation is unreliable for SAT.
    Li D; Li X; Huang H; Li X
    Biosystems; 2005 Oct; 82(1):20-5. PubMed ID: 16024166
    [TBL] [Abstract][Full Text] [Related]  

  • 26. Parallel point-multiplication architecture using combined group operations for high-speed cryptographic applications.
    Hossain MS; Saeedi E; Kong Y
    PLoS One; 2017; 12(5):e0176214. PubMed ID: 28459831
    [TBL] [Abstract][Full Text] [Related]  

  • 27. Molecular solutions to the binary integer programming problem based on DNA computation.
    Yeh CW; Chu CP; Wu KR
    Biosystems; 2006 Jan; 83(1):56-66. PubMed ID: 16229936
    [TBL] [Abstract][Full Text] [Related]  

  • 28. DNA-based cryptographic methods for data hiding in DNA media.
    Marwan S; Shawish A; Nagaty K
    Biosystems; 2016 Dec; 150():110-118. PubMed ID: 27634362
    [TBL] [Abstract][Full Text] [Related]  

  • 29. Retrieval efficiency of DNA-based databases of digital signals.
    Tsaftaris SA; Katsaggelos AK
    IEEE Trans Nanobioscience; 2009 Sep; 8(3):259-70. PubMed ID: 19596640
    [TBL] [Abstract][Full Text] [Related]  

  • 30. Secure public cloud platform for medical images sharing.
    Pan W; Coatrieux G; Bouslimi D; Prigent N
    Stud Health Technol Inform; 2015; 210():251-5. PubMed ID: 25991144
    [TBL] [Abstract][Full Text] [Related]  

  • 31. Efficiently Multi-User Searchable Encryption Scheme with Attribute Revocation and Grant for Cloud Storage.
    Wang S; Zhang X; Zhang Y
    PLoS One; 2016; 11(11):e0167157. PubMed ID: 27898703
    [TBL] [Abstract][Full Text] [Related]  

  • 32. A Parallel DNA Algorithm for Solving the Quota Traveling Salesman Problem Based on Biocomputing Model.
    Wang Z; Wu X; Wu T
    Comput Intell Neurosci; 2022; 2022():1450756. PubMed ID: 36093485
    [TBL] [Abstract][Full Text] [Related]  

  • 33. Untraceable partially blind signature based on DLOG problem.
    Huang Z; Chen KF; Kou WD
    J Zhejiang Univ Sci; 2004 Jan; 5(1):40-4. PubMed ID: 14663850
    [TBL] [Abstract][Full Text] [Related]  

  • 34. Solving the Family Traveling Salesperson Problem in the Adleman-Lipton Model Based on DNA Computing.
    Wu X; Wang Z; Wu T; Bao X
    IEEE Trans Nanobioscience; 2022 Jan; 21(1):75-85. PubMed ID: 34460379
    [TBL] [Abstract][Full Text] [Related]  

  • 35. A parallel algorithm for solving the n-queens problem based on inspired computational model.
    Wang Z; Huang D; Tan J; Liu T; Zhao K; Li L
    Biosystems; 2015 May; 131():22-9. PubMed ID: 25817410
    [TBL] [Abstract][Full Text] [Related]  

  • 36. Unbounded and revocable hierarchical identity-based encryption with adaptive security, decryption key exposure resistant, and short public parameters.
    Xing Q; Wang B; Wang X; Tao J
    PLoS One; 2018; 13(4):e0195204. PubMed ID: 29649326
    [TBL] [Abstract][Full Text] [Related]  

  • 37. Comment on "Cheating prevention in visual cryptography".
    Chen YC; Horng G; Tsai DS
    IEEE Trans Image Process; 2012 Jul; 21(7):3319-23. PubMed ID: 22410333
    [TBL] [Abstract][Full Text] [Related]  

  • 38. Security analysis and secure channel-free certificateless searchable public key authenticated encryption for a cloud-based Internet of things.
    Wu B; Wang C; Yao H
    PLoS One; 2020; 15(4):e0230722. PubMed ID: 32271788
    [TBL] [Abstract][Full Text] [Related]  

  • 39. An Improved Authentication and Security on Efficient Generalized Group Key Agreement Using Hyper Elliptic Curve Based Public Key Cryptography for IoT Health Care System.
    Kavitha S; Alphonse PJA; Reddy YV
    J Med Syst; 2019 Jul; 43(8):260. PubMed ID: 31267216
    [TBL] [Abstract][Full Text] [Related]  

  • 40. Fractional Fourier domain optical image hiding using phase retrieval algorithm based on iterative nonlinear double random phase encoding.
    Wang X; Chen W; Chen X
    Opt Express; 2014 Sep; 22(19):22981-95. PubMed ID: 25321769
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 7.