These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

128 related articles for article (PubMed ID: 24959619)

  • 21. A secure RFID mutual authentication protocol for healthcare environments using elliptic curve cryptography.
    Jin C; Xu C; Zhang X; Zhao J
    J Med Syst; 2015 Mar; 39(3):24. PubMed ID: 25666925
    [TBL] [Abstract][Full Text] [Related]  

  • 22. A Secure ECC-based RFID Mutual Authentication Protocol to Enhance Patient Medication Safety.
    Jin C; Xu C; Zhang X; Li F
    J Med Syst; 2016 Jan; 40(1):12. PubMed ID: 26573649
    [TBL] [Abstract][Full Text] [Related]  

  • 23. WSN-SLAP: Secure and Lightweight Mutual Authentication Protocol for Wireless Sensor Networks.
    Kwon DK; Yu SJ; Lee JY; Son SH; Park YH
    Sensors (Basel); 2021 Jan; 21(3):. PubMed ID: 33573308
    [TBL] [Abstract][Full Text] [Related]  

  • 24. Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol.
    He D; Kumar N; Chilamkurti N; Lee JH
    J Med Syst; 2014 Oct; 38(10):116. PubMed ID: 25096968
    [TBL] [Abstract][Full Text] [Related]  

  • 25. A Provably Secure RFID Authentication Protocol Based on Elliptic Curve for Healthcare Environments.
    Farash MS; Nawaz O; Mahmood K; Chaudhry SA; Khan MK
    J Med Syst; 2016 Jul; 40(7):165. PubMed ID: 27221283
    [TBL] [Abstract][Full Text] [Related]  

  • 26. A hash based mutual RFID tag authentication protocol in telecare medicine information system.
    Srivastava K; Awasthi AK; Kaul SD; Mittal RC
    J Med Syst; 2015 Jan; 39(1):153. PubMed ID: 25491577
    [TBL] [Abstract][Full Text] [Related]  

  • 27. Secure anonymous mutual authentication for star two-tier wireless body area networks.
    Ibrahim MH; Kumari S; Das AK; Wazid M; Odelu V
    Comput Methods Programs Biomed; 2016 Oct; 135():37-50. PubMed ID: 27586478
    [TBL] [Abstract][Full Text] [Related]  

  • 28. 5G-AKA-FS: A 5G Authentication and Key Agreement Protocol for Forward Secrecy.
    You I; Kim G; Shin S; Kwon H; Kim J; Baek J
    Sensors (Basel); 2023 Dec; 24(1):. PubMed ID: 38203020
    [TBL] [Abstract][Full Text] [Related]  

  • 29. A Lightweight Authentication MAC Protocol for CR-WSNs.
    Aloufi BO; Alhakami W
    Sensors (Basel); 2023 Feb; 23(4):. PubMed ID: 36850612
    [TBL] [Abstract][Full Text] [Related]  

  • 30. An Enhanced Lightweight IoT-based Authentication Scheme in Cloud Computing Circumstances.
    Martínez-Peláez R; Toral-Cruz H; Parra-Michel JR; García V; Mena LJ; Félix VG; Ochoa-Brust A
    Sensors (Basel); 2019 May; 19(9):. PubMed ID: 31064133
    [TBL] [Abstract][Full Text] [Related]  

  • 31. Secure Three-Factor Authentication Protocol for Multi-Gateway IoT Environments.
    Lee J; Yu S; Park K; Park Y; Park Y
    Sensors (Basel); 2019 May; 19(10):. PubMed ID: 31121895
    [TBL] [Abstract][Full Text] [Related]  

  • 32. An efficient RFID authentication protocol to enhance patient medication safety using elliptic curve cryptography.
    Zhang Z; Qi Q
    J Med Syst; 2014 May; 38(5):47. PubMed ID: 24733525
    [TBL] [Abstract][Full Text] [Related]  

  • 33. Permutation Matrix Encryption Based Ultralightweight Secure RFID Scheme in Internet of Vehicles.
    Fan K; Kang J; Zhu S; Li H; Yang Y
    Sensors (Basel); 2019 Jan; 19(1):. PubMed ID: 30621131
    [TBL] [Abstract][Full Text] [Related]  

  • 34. A Lightweight Three-Factor Authentication Scheme for WHSN Architecture.
    Almuhaideb AM; Alqudaihi K
    Sensors (Basel); 2020 Nov; 20(23):. PubMed ID: 33266197
    [TBL] [Abstract][Full Text] [Related]  

  • 35. Modifying the ECC-based grouping-proof RFID system to increase inpatient medication safety.
    Ko WT; Chiou SY; Lu EH; Chang HK
    J Med Syst; 2014 Sep; 38(9):66. PubMed ID: 24997856
    [TBL] [Abstract][Full Text] [Related]  

  • 36. A note on the security of IS-RFID, an inpatient medication safety.
    Safkhani M; Bagheri N; Naderi M
    Int J Med Inform; 2014 Jan; 83(1):82-5. PubMed ID: 23659961
    [TBL] [Abstract][Full Text] [Related]  

  • 37. A Key Management Protocol Based on the Hash Chain Key Generation for Securing LoRaWAN Networks.
    Hakeem SAA; El-Kader SMA; Kim H
    Sensors (Basel); 2021 Aug; 21(17):. PubMed ID: 34502729
    [TBL] [Abstract][Full Text] [Related]  

  • 38. Construction of a Chaotic Map-Based Authentication Protocol for TMIS.
    Dharminder D; Kundu N; Mishra D
    J Med Syst; 2021 Jul; 45(8):77. PubMed ID: 34213620
    [TBL] [Abstract][Full Text] [Related]  

  • 39. Drone Secure Communication Protocol for Future Sensitive Applications in Military Zone.
    Ko Y; Kim J; Duguma DG; Astillo PV; You I; Pau G
    Sensors (Basel); 2021 Mar; 21(6):. PubMed ID: 33804023
    [TBL] [Abstract][Full Text] [Related]  

  • 40. A Secure and Lightweight Authentication Protocol for IoT-Based Smart Homes.
    Oh J; Yu S; Lee J; Son S; Kim M; Park Y
    Sensors (Basel); 2021 Feb; 21(4):. PubMed ID: 33669920
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 7.