These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
42 related articles for article (PubMed ID: 24513737)
1. Protocol based on compressed sensing for high-speed authentication and cryptographic key distribution over a multiparty optical network. Yu WK; Li S; Yao XR; Liu XF; Wu LA; Zhai GJ Appl Opt; 2013 Nov; 52(33):7882-8. PubMed ID: 24513737 [TBL] [Abstract][Full Text] [Related]
2. High-speed secure key distribution over an optical network based on computational correlation imaging. Li S; Yao XR; Yu WK; Wu LA; Zhai GJ Opt Lett; 2013 Jun; 38(12):2144-6. PubMed ID: 23939004 [TBL] [Abstract][Full Text] [Related]
3. Cryptographic key distribution over a public network via variance-based watermarking in compressive measurements. Yu WK Appl Opt; 2019 Jul; 58(19):5294-5300. PubMed ID: 31503628 [TBL] [Abstract][Full Text] [Related]
4. Cryptographic framework for document-objects resulting from multiparty collaborative transactions. Goh A Stud Health Technol Inform; 2000; 77():1069-73. PubMed ID: 11187485 [TBL] [Abstract][Full Text] [Related]
5. Multi-Party Cryptographic Key Distribution Protocol over a Public Network Based on a Quick-Response Code. Yu WK; Yang Y; Li YX; Wei N; Wang SF Sensors (Basel); 2022 May; 22(11):. PubMed ID: 35684616 [TBL] [Abstract][Full Text] [Related]
6. A New Quantum Multiparty Simultaneous Identity Authentication Protocol with the Classical Third-Party. Li X; Zhang K; Zhang L; Zhao X Entropy (Basel); 2022 Mar; 24(4):. PubMed ID: 35455145 [TBL] [Abstract][Full Text] [Related]
7. Self-Assembled Resonance Energy Transfer Keys for Secure Communication over Classical Channels. Nellore V; Xi S; Dwyer C ACS Nano; 2015 Dec; 9(12):11840-8. PubMed ID: 26525314 [TBL] [Abstract][Full Text] [Related]
8. A covert authentication and security solution for GMOs. Mueller S; Jafari F; Roth D BMC Bioinformatics; 2016 Sep; 17(1):389. PubMed ID: 27653779 [TBL] [Abstract][Full Text] [Related]
9. Enriching healthcare applications with cryptographic mechanisms and XML- based security services. Bourka A; Kaliontzoglou A; Polemi D; Georgoulas A; Sklavos P Technol Health Care; 2003; 11(1):61-76. PubMed ID: 12590159 [TBL] [Abstract][Full Text] [Related]
10. Optical authentication method based on correspondence ghost imaging. Zhang J; Zhao D; Li Y; Liu Y; Sun M; Li X; Yu Z; Zhou X Appl Opt; 2023 Oct; 62(29):7678-7688. PubMed ID: 37855475 [TBL] [Abstract][Full Text] [Related]
11. Resource optimized TTSH-URA for multimedia stream authentication in swallowable-capsule-based wireless body sensor networks. Wang W; Wang C; Zhao M IEEE J Biomed Health Inform; 2014 Mar; 18(2):404-10. PubMed ID: 24608045 [TBL] [Abstract][Full Text] [Related]
12. Efficient multiuser quantum cryptography network based on entanglement. Xue P; Wang K; Wang X Sci Rep; 2017 Apr; 7():45928. PubMed ID: 28374854 [TBL] [Abstract][Full Text] [Related]
13. Secure SCADA communication by using a modified key management scheme. Rezai A; Keshavarzi P; Moravej Z ISA Trans; 2013 Jul; 52(4):517-24. PubMed ID: 23528753 [TBL] [Abstract][Full Text] [Related]
14. Lightweight and confidential data discovery and dissemination for wireless body area networks. He D; Chan S; Zhang Y; Yang H IEEE J Biomed Health Inform; 2014 Mar; 18(2):440-8. PubMed ID: 24608049 [TBL] [Abstract][Full Text] [Related]
15. The construction of a public key infrastructure for healthcare information networks in Japan. Sakamoto N Stud Health Technol Inform; 2001; 84(Pt 2):1276-80. PubMed ID: 11604934 [TBL] [Abstract][Full Text] [Related]
17. Medical network security and viruses. Fernandez Del Val C Stud Health Technol Inform; 1991; 1():271-84. PubMed ID: 10164072 [TBL] [Abstract][Full Text] [Related]
18. Compressed sensing with linear-in-wavenumber sampling in spectral-domain optical coherence tomography. Zhang N; Huo T; Wang C; Chen T; Zheng JG; Xue P Opt Lett; 2012 Aug; 37(15):3075-7. PubMed ID: 22859090 [TBL] [Abstract][Full Text] [Related]
19. Adaptive compressive ghost imaging based on wavelet trees and sparse representation. Yu WK; Li MF; Yao XR; Liu XF; Wu LA; Zhai GJ Opt Express; 2014 Mar; 22(6):7133-44. PubMed ID: 24664061 [TBL] [Abstract][Full Text] [Related]
20. Object authentication based on compressive ghost imaging. Chen Z; Shi J; Zeng G Appl Opt; 2016 Oct; 55(30):8644-8650. PubMed ID: 27828147 [TBL] [Abstract][Full Text] [Related] [Next] [New Search]