These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

81 related articles for article (PubMed ID: 19749269)

  • 1. Effective algorithm to encrypt information based on self-assembly of DNA tiles.
    Hirabayashi M; Kojima H; Oiwa K
    Nucleic Acids Symp Ser (Oxf); 2009; (53):79-80. PubMed ID: 19749269
    [TBL] [Abstract][Full Text] [Related]  

  • 2. DNA based random key generation and management for OTP encryption.
    Zhang Y; Liu X; Sun M
    Biosystems; 2017 Sep; 159():51-63. PubMed ID: 28733249
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Logical computation using algorithmic self-assembly of DNA triple-crossover molecules.
    Mao C; LaBean TH; Relf JH; Seeman NC
    Nature; 2000 Sep; 407(6803):493-6. PubMed ID: 11028996
    [TBL] [Abstract][Full Text] [Related]  

  • 4. On the security of a new image encryption scheme based on chaotic map lattices.
    Arroyo D; Rhouma R; Alvarez G; Li S; Fernandez V
    Chaos; 2008 Sep; 18(3):033112. PubMed ID: 19045450
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Error function attack of chaos synchronization based encryption schemes.
    Wang X; Zhan M; Lai CH; Gang H
    Chaos; 2004 Mar; 14(1):128-37. PubMed ID: 15003053
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Parallel molecular computations of pairwise exclusive-or (XOR) using DNA "string tile" self-assembly.
    Yan H; Feng L; LaBean TH; Reif JH
    J Am Chem Soc; 2003 Nov; 125(47):14246-7. PubMed ID: 14624551
    [TBL] [Abstract][Full Text] [Related]  

  • 7. DNA-based watermarks using the DNA-Crypt algorithm.
    Heider D; Barnekow A
    BMC Bioinformatics; 2007 May; 8():176. PubMed ID: 17535434
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Analysis of punctures in DNA self-assembly under forward growth.
    Hashempour M; Arani ZM; Lombardi F
    IEEE Trans Nanobioscience; 2008 Jun; 7(2):120-32. PubMed ID: 18556260
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Algorithmic self-assembly of DNA Sierpinski triangles.
    Rothemund PW; Papadakis N; Winfree E
    PLoS Biol; 2004 Dec; 2(12):e424. PubMed ID: 15583715
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Security enhancement of a phase-truncation based image encryption algorithm.
    Wang X; Zhao D
    Appl Opt; 2011 Dec; 50(36):6645-51. PubMed ID: 22193194
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Rfold: an exact algorithm for computing local base pairing probabilities.
    Kiryu H; Kin T; Asai K
    Bioinformatics; 2008 Feb; 24(3):367-73. PubMed ID: 18056736
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Is optimal solution of every NP-complete or NP-hard problem determined from its characteristic for DNA-based computing.
    Guo M; Chang WL; Ho M; Lu J; Cao J
    Biosystems; 2005 Apr; 80(1):71-82. PubMed ID: 15740836
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Generalized Poland-Scheraga model for DNA hybridization.
    Garel T; Orland H
    Biopolymers; 2004 Dec; 75(6):453-67. PubMed ID: 15499567
    [TBL] [Abstract][Full Text] [Related]  

  • 14. One-time-pad cryptography scheme based on a three-dimensional DNA self-assembly pyramid structure.
    Peng W; Cheng D; Song C
    PLoS One; 2018; 13(11):e0206612. PubMed ID: 30399178
    [TBL] [Abstract][Full Text] [Related]  

  • 15. DNA computation model to solve 0-1 programming problem.
    Zhang F; Yin Z; Liu B; Xu J
    Biosystems; 2004; 74(1-3):9-14. PubMed ID: 15125989
    [TBL] [Abstract][Full Text] [Related]  

  • 16. A theoretical application of selectable markers in bacterial episomes for a DNA cryptosystem.
    Morford L
    J Theor Biol; 2011 Mar; 273(1):100-2. PubMed ID: 21195092
    [TBL] [Abstract][Full Text] [Related]  

  • 17. On the security of a spatiotemporal chaotic cryptosystem.
    Rhouma R; Safya B
    Chaos; 2007 Sep; 17(3):033117. PubMed ID: 17902999
    [TBL] [Abstract][Full Text] [Related]  

  • 18. High-performance multimedia encryption system based on chaos.
    Hasimoto-Beltrán R
    Chaos; 2008 Jun; 18(2):023110. PubMed ID: 18601477
    [TBL] [Abstract][Full Text] [Related]  

  • 19. High efficient key-insulated attribute based encryption scheme without bilinear pairing operations.
    Hong H; Sun Z
    Springerplus; 2016; 5():131. PubMed ID: 26933630
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Selective image encryption using a spatiotemporal chaotic system.
    Xiang T; Wong KW; Liao X
    Chaos; 2007 Jun; 17(2):023115. PubMed ID: 17614669
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 5.