These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

121 related articles for article (PubMed ID: 22346700)

  • 1. Secure Many-to-One Communications in Wireless Sensor Networks.
    Viejo A; Domingo-Ferrer J; Sebé F; Castellà-Roca J
    Sensors (Basel); 2009; 9(7):5324-38. PubMed ID: 22346700
    [TBL] [Abstract][Full Text] [Related]  

  • 2. An Outline of Data Aggregation Security in Heterogeneous Wireless Sensor Networks.
    Boubiche S; Boubiche DE; Bilami A; Toral-Cruz H
    Sensors (Basel); 2016 Apr; 16(4):. PubMed ID: 27077866
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Distributed Key Management to Secure IoT Wireless Sensor Networks in Smart-Agro.
    Mawlood Hussein S; López Ramos JA; Álvarez Bermejo JA
    Sensors (Basel); 2020 Apr; 20(8):. PubMed ID: 32326650
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Secure and Authenticated Data Communication in Wireless Sensor Networks.
    Alfandi O; Bochem A; Kellner A; Göge C; Hogrefe D
    Sensors (Basel); 2015 Aug; 15(8):19560-82. PubMed ID: 26266413
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Operating systems for wireless sensor networks: a survey.
    Farooq MO; Kunz T
    Sensors (Basel); 2011; 11(6):5900-30. PubMed ID: 22163934
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Secure Authentication Protocol for Wireless Sensor Networks in Vehicular Communications.
    Yu S; Lee J; Lee K; Park K; Park Y
    Sensors (Basel); 2018 Sep; 18(10):. PubMed ID: 30248898
    [TBL] [Abstract][Full Text] [Related]  

  • 7. WSN-SLAP: Secure and Lightweight Mutual Authentication Protocol for Wireless Sensor Networks.
    Kwon DK; Yu SJ; Lee JY; Son SH; Park YH
    Sensors (Basel); 2021 Jan; 21(3):. PubMed ID: 33573308
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Secure and Time-Aware Communication of Wireless Sensors Monitoring Overhead Transmission Lines.
    Mazur K; Wydra M; Ksiezopolski B
    Sensors (Basel); 2017 Jul; 17(7):. PubMed ID: 28696390
    [TBL] [Abstract][Full Text] [Related]  

  • 9. A wormhole attack detection method for tactical wireless sensor networks.
    Zhang K
    PeerJ Comput Sci; 2023; 9():e1449. PubMed ID: 37705659
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Cryptanalysis and security improvements of 'two-factor user authentication in wireless sensor networks'.
    Khan MK; Alghathbar K
    Sensors (Basel); 2010; 10(3):2450-9. PubMed ID: 22294935
    [TBL] [Abstract][Full Text] [Related]  

  • 11. A secured authentication protocol for wireless sensor networks using elliptic curves cryptography.
    Yeh HL; Chen TH; Liu PC; Kim TH; Wei HW
    Sensors (Basel); 2011; 11(5):4767-79. PubMed ID: 22163874
    [TBL] [Abstract][Full Text] [Related]  

  • 12. SLUA-WSN: Secure and Lightweight Three-Factor-Based User Authentication Protocol for Wireless Sensor Networks.
    Yu S; Park Y
    Sensors (Basel); 2020 Jul; 20(15):. PubMed ID: 32722503
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Nearest neighbor imputation using spatial-temporal correlations in wireless sensor networks.
    Li Y; Parker LE
    Inf Fusion; 2014 Jan; 15():64-79. PubMed ID: 28435414
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Cost-Effective Encryption-Based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks.
    Saleem K; Derhab A; Orgun MA; Al-Muhtadi J; Rodrigues JJ; Khalil MS; Ali Ahmed A
    Sensors (Basel); 2016 Mar; 16(4):460. PubMed ID: 27043572
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Software Defined Networking for Improved Wireless Sensor Network Management: A Survey.
    Ndiaye M; Hancke GP; Abu-Mahfouz AM
    Sensors (Basel); 2017 May; 17(5):. PubMed ID: 28471390
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Cryptanalysis and Improvement of a Privacy-Preserving Three-Factor Authentication Protocol for Wireless Sensor Networks.
    Renuka K; Kumar S; Kumari S; Chen CM
    Sensors (Basel); 2019 Oct; 19(21):. PubMed ID: 31653025
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Multi-Layer Approach for the Detection of Selective Forwarding Attacks.
    Alajmi N; Elleithy K
    Sensors (Basel); 2015 Nov; 15(11):29332-45. PubMed ID: 26610499
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Simulation of Attacks for Security in Wireless Sensor Network.
    Diaz A; Sanchez P
    Sensors (Basel); 2016 Nov; 16(11):. PubMed ID: 27869710
    [TBL] [Abstract][Full Text] [Related]  

  • 19. An Authentication Protocol for Future Sensor Networks.
    Bilal M; Kang SG
    Sensors (Basel); 2017 Apr; 17(5):. PubMed ID: 28452937
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Sensor data security level estimation scheme for wireless sensor networks.
    Ramos A; Filho RH
    Sensors (Basel); 2015 Jan; 15(1):2104-36. PubMed ID: 25608215
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 7.