These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

151 related articles for article (PubMed ID: 24977226)

  • 1. A game-theoretical approach to multimedia social networks security.
    Liu E; Liu Z; Shao F; Zhang Z
    ScientificWorldJournal; 2014; 2014():791690. PubMed ID: 24977226
    [TBL] [Abstract][Full Text] [Related]  

  • 2. A joint signal processing and cryptographic approach to multimedia encryption.
    Mao Y; Wu M
    IEEE Trans Image Process; 2006 Jul; 15(7):2061-75. PubMed ID: 16830924
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Password-only authenticated three-party key exchange with provable security in the standard model.
    Nam J; Choo KK; Kim J; Kang HK; Kim J; Paik J; Won D
    ScientificWorldJournal; 2014; 2014():825072. PubMed ID: 24977229
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Exploring context and content links in social media: a latent space method.
    Qi GJ; Aggarwal C; Tian Q; Ji H; Huang TS
    IEEE Trans Pattern Anal Mach Intell; 2012 May; 34(5):850-62. PubMed ID: 21968917
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Game Theoretical Analysis on Cooperation Stability and Incentive Effectiveness in Community Networks.
    Song K; Wang R; Liu Y; Qian D; Zhang H; Cai J
    PLoS One; 2015; 10(11):e0141755. PubMed ID: 26551649
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Security of medical multimedia.
    Tzelepi S; Pangalos G; Nikolacopoulou G
    Med Inform Internet Med; 2002 Sep; 27(3):169-84. PubMed ID: 12507263
    [TBL] [Abstract][Full Text] [Related]  

  • 7. A secure cluster-based multipath routing protocol for WMSNs.
    Almalkawi IT; Zapata MG; Al-Karaki JN
    Sensors (Basel); 2011; 11(4):4401-24. PubMed ID: 22163854
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Cooperation stimulation strategies for peer-to-peer wireless live video-sharing social networks.
    Lin WS; Zhao HV; Liu KJ
    IEEE Trans Image Process; 2010 Jul; 19(7):1768-84. PubMed ID: 20227979
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Secure Dynamic access control scheme of PHR in cloud computing.
    Chen TS; Liu CH; Chen TL; Chen CS; Bau JG; Lin TC
    J Med Syst; 2012 Dec; 36(6):4005-20. PubMed ID: 22926919
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Privacy-Enhancing
    Li Y; Zhou F; Ge Y; Xu Z
    Sensors (Basel); 2021 Jun; 21(12):. PubMed ID: 34207856
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Enhancing privacy and authorization control scalability in the grid through ontologies.
    Blanquer I; Hernández V; Segrelles D; Torres E
    IEEE Trans Inf Technol Biomed; 2009 Jan; 13(1):16-24. PubMed ID: 19129020
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Web multimedia information retrieval using improved Bayesian algorithm.
    Yu YJ; Chen C; Yu YM; Lin HZ
    J Zhejiang Univ Sci; 2003; 4(4):415-20. PubMed ID: 12861616
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Privacy policies for health social networking sites.
    Li J
    J Am Med Inform Assoc; 2013; 20(4):704-7. PubMed ID: 23599228
    [TBL] [Abstract][Full Text] [Related]  

  • 14. DICOM image secure communications with Internet protocols IPv6 and IPv4.
    Zhang J; Yu F; Sun J; Yang Y; Liang C
    IEEE Trans Inf Technol Biomed; 2007 Jan; 11(1):70-80. PubMed ID: 17249405
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Towards developing a secure medical image sharing system based on zero trust principles and blockchain technology.
    Sultana M; Hossain A; Laila F; Taher KA; Islam MN
    BMC Med Inform Decis Mak; 2020 Oct; 20(1):256. PubMed ID: 33028318
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Multi-energy conversion based on game theory in the industrial interconnection.
    He J; Wu X; Li J; He S
    PLoS One; 2021; 16(1):e0245622. PubMed ID: 33465129
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Towards Security Joint Trust and Game Theory for Maximizing Utility: Challenges and Countermeasures.
    Huang L; Jia G; Fang W; Chen W; Zhang W
    Sensors (Basel); 2019 Dec; 20(1):. PubMed ID: 31906035
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models.
    Rao NS; Poole SW; Ma CY; He F; Zhuang J; Yau DK
    Risk Anal; 2016 Apr; 36(4):694-710. PubMed ID: 25847370
    [TBL] [Abstract][Full Text] [Related]  

  • 19. A Game-Theoretic Framework to Preserve Location Information Privacy in Location-based Service Applications.
    Tefera MK; Yang X
    Sensors (Basel); 2019 Apr; 19(7):. PubMed ID: 30939858
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Quality of protection evaluation of security mechanisms.
    Ksiezopolski B; Zurek T; Mokkas M
    ScientificWorldJournal; 2014; 2014():725279. PubMed ID: 25136683
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 8.