BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

329 related articles for article (PubMed ID: 19045507)

  • 1. Comment on "On the security of a spatiotemporal chaotic cryptosystem" [Chaos 17, 033117 (2007)].
    Wang S; Hu G
    Chaos; 2008 Sep; 18(3):038102. PubMed ID: 19045507
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Comment on "Encryption and decryption of images with chaotic map lattices" [Chaos 16, 033118 (2006)].
    Solak E; Cokal C
    Chaos; 2008 Sep; 18(3):038101. PubMed ID: 19045506
    [TBL] [Abstract][Full Text] [Related]  

  • 3. On the security of a new image encryption scheme based on chaotic map lattices.
    Arroyo D; Rhouma R; Alvarez G; Li S; Fernandez V
    Chaos; 2008 Sep; 18(3):033112. PubMed ID: 19045450
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Security enhanced optical encryption system by random phase key and permutation key.
    He M; Tan Q; Cao L; He Q; Jin G
    Opt Express; 2009 Dec; 17(25):22462-73. PubMed ID: 20052170
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Breaking a chaos-noise-based secure communication scheme.
    Li S; Alvarez G; Chen G; Mou X
    Chaos; 2005 Mar; 15(1):13703. PubMed ID: 15836271
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Cryptanalysis of a chaotic communication scheme using adaptive observer.
    Liu Y; Tang WK
    Chaos; 2008 Dec; 18(4):043110. PubMed ID: 19123620
    [TBL] [Abstract][Full Text] [Related]  

  • 7. A chaos-based digital image encryption scheme with an improved diffusion strategy.
    Fu C; Chen JJ; Zou H; Meng WH; Zhan YF; Yu YW
    Opt Express; 2012 Jan; 20(3):2363-78. PubMed ID: 22330475
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Error function attack of chaos synchronization based encryption schemes.
    Wang X; Zhan M; Lai CH; Gang H
    Chaos; 2004 Mar; 14(1):128-37. PubMed ID: 15003053
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Spread spectrum communication system with chaotic frequency modulation.
    Volkovskii AR; Tsimring LSh; Rulkov NF; Langmore I
    Chaos; 2005 Sep; 15(3):33101. PubMed ID: 16252975
    [TBL] [Abstract][Full Text] [Related]  

  • 10. On the security of a spatiotemporal chaotic cryptosystem.
    Rhouma R; Safya B
    Chaos; 2007 Sep; 17(3):033117. PubMed ID: 17902999
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Improving the privacy of optical steganography with temporal phase masks.
    Wang Z; Fok MP; Xu L; Chang J; Prucnal PR
    Opt Express; 2010 Mar; 18(6):6079-88. PubMed ID: 20389629
    [TBL] [Abstract][Full Text] [Related]  

  • 12. A new chaotic communication scheme based on adaptive synchronization.
    Xiang-Jun W
    Chaos; 2006 Dec; 16(4):043118. PubMed ID: 17199396
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Double images encryption method with resistance against the specific attack based on an asymmetric algorithm.
    Wang X; Zhao D
    Opt Express; 2012 May; 20(11):11994-2003. PubMed ID: 22714185
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Decryption of pure-position permutation algorithms.
    Zhao XY; Chen G; Zhang D; Wang XH; Dong GC
    J Zhejiang Univ Sci; 2004 Jul; 5(7):803-9. PubMed ID: 15495308
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Image modeling using interscale phase properties of complex wavelet coefficients.
    Miller M; Kingsbury N
    IEEE Trans Image Process; 2008 Sep; 17(9):1491-9. PubMed ID: 18701389
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Multiresolution image representation using combined 2-D and 1-D directional filter banks.
    Tanaka Y; Ikehara M; Nguyen TQ
    IEEE Trans Image Process; 2009 Feb; 18(2):269-80. PubMed ID: 19095538
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Optical double-image cryptography based on diffractive imaging with a laterally-translated phase grating.
    Chen W; Chen X; Sheppard CJ
    Appl Opt; 2011 Oct; 50(29):5750-7. PubMed ID: 22015370
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Novel synchronization of discrete-time chaotic systems using neural network observer.
    Naghavi SV; Safavi AA
    Chaos; 2008 Sep; 18(3):033110. PubMed ID: 19045448
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Improvement of Laih and Yen's multisignature scheme.
    Xie Q; Yu XY
    J Zhejiang Univ Sci; 2004 Sep; 5(9):1155-9. PubMed ID: 15323013
    [TBL] [Abstract][Full Text] [Related]  

  • 20. A hybrid heuristic algorithm to improve known-plaintext attack on Fourier plane encryption.
    Liu W; Yang G; Xie H
    Opt Express; 2009 Aug; 17(16):13928-38. PubMed ID: 19654800
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 17.