These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

140 related articles for article (PubMed ID: 25101313)

  • 1. A survey of research progress and development tendency of attribute-based encryption.
    Pang L; Yang J; Jiang Z
    ScientificWorldJournal; 2014; 2014():193426. PubMed ID: 25101313
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Traceable ciphertext-policy attribute-based encryption scheme with attribute level user revocation for cloud storage.
    Wang S; Guo K; Zhang Y
    PLoS One; 2018; 13(9):e0203225. PubMed ID: 30212473
    [TBL] [Abstract][Full Text] [Related]  

  • 3. A revocable storage CP-ABE scheme with constant ciphertext length in cloud storage.
    Zhao Y; Xie X; Zhang X; Ding Y
    Math Biosci Eng; 2019 May; 16(5):4229-4249. PubMed ID: 31499660
    [TBL] [Abstract][Full Text] [Related]  

  • 4. A Ring Learning with Errors-Based Ciphertext-Policy Attribute-Based Proxy Re-Encryption Scheme for Secure Big Data Sharing in Cloud Environment.
    Li J; Peng J; Qiao Z
    Big Data; 2024 Oct; 12(5):357-366. PubMed ID: 35417273
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Survey on Revocation in Ciphertext-Policy Attribute-Based Encryption.
    Al-Dahhan RR; Shi Q; Lee GM; Kifayat K
    Sensors (Basel); 2019 Apr; 19(7):. PubMed ID: 30970678
    [TBL] [Abstract][Full Text] [Related]  

  • 6. A Lightweight CP-ABE Scheme with Direct Attribute Revocation for Vehicular Ad Hoc Network.
    Liu Y; Xu S; Yue Z
    Entropy (Basel); 2023 Jun; 25(7):. PubMed ID: 37509926
    [TBL] [Abstract][Full Text] [Related]  

  • 7. A Study on CP-ABE-based Medical Data Sharing System with Key Abuse Prevention and Verifiable Outsourcing in the IoMT Environment.
    Hwang YW; Lee IY
    Sensors (Basel); 2020 Aug; 20(17):. PubMed ID: 32878202
    [TBL] [Abstract][Full Text] [Related]  

  • 8. A Secured Proxy-Based Data Sharing Module in IoT Environments Using Blockchain.
    Obour Agyekum KO; Xia Q; Sifah EB; Gao J; Xia H; Du X; Guizani M
    Sensors (Basel); 2019 Mar; 19(5):. PubMed ID: 30862110
    [TBL] [Abstract][Full Text] [Related]  

  • 9. A keyword searchable attribute-based encryption scheme with attribute update for cloud storage.
    Wang S; Ye J; Zhang Y
    PLoS One; 2018; 13(5):e0197318. PubMed ID: 29795577
    [TBL] [Abstract][Full Text] [Related]  

  • 10. An Access Control Scheme Based on Blockchain and Ciphertext Policy-Attribute Based Encryption.
    Hu R; Ma Z; Li L; Zuo P; Li X; Wei J; Liu S
    Sensors (Basel); 2023 Sep; 23(19):. PubMed ID: 37836868
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Comparison of attribute-based encryption schemes in securing healthcare systems.
    Walid R; Joshi KP; Choi SG
    Sci Rep; 2024 Mar; 14(1):7147. PubMed ID: 38532119
    [TBL] [Abstract][Full Text] [Related]  

  • 12. CESCR: CP-ABE for efficient and secure sharing of data in collaborative ehealth with revocation and no dummy attribute.
    Edemacu K; Jang B; Kim JW
    PLoS One; 2021; 16(5):e0250992. PubMed ID: 33974672
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Efficient lattice-based revocable attribute-based encryption against decryption key exposure for cloud file sharing.
    Huang B; Gao J; Li X
    J Cloud Comput (Heidelb); 2023; 12(1):37. PubMed ID: 36937653
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Attribute-based encryption scheme with multi-keyword search and supporting attribute revocation in cloud storage.
    Wang S; Yao L; Zhang Y
    PLoS One; 2018; 13(10):e0205675. PubMed ID: 30312345
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Efficiently Multi-User Searchable Encryption Scheme with Attribute Revocation and Grant for Cloud Storage.
    Wang S; Zhang X; Zhang Y
    PLoS One; 2016; 11(11):e0167157. PubMed ID: 27898703
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Online/Offline MA-CP-ABE with Cryptographic Reverse Firewalls for IoT.
    Li J; Fan Y; Bian X; Yuan Q
    Entropy (Basel); 2023 Apr; 25(4):. PubMed ID: 37190404
    [TBL] [Abstract][Full Text] [Related]  

  • 17. High efficient key-insulated attribute based encryption scheme without bilinear pairing operations.
    Hong H; Sun Z
    Springerplus; 2016; 5():131. PubMed ID: 26933630
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Searchable and revocable multi-data owner attribute-based encryption scheme with hidden policy in cloud storage.
    Wang S; Gao T; Zhang Y
    PLoS One; 2018; 13(11):e0206126. PubMed ID: 30383840
    [TBL] [Abstract][Full Text] [Related]  

  • 19. An Access Control Scheme With Privacy-Preserving Authentication and Flexible Revocation for Smart Healthcare.
    Liang X; Liu Y; Ning J
    IEEE J Biomed Health Inform; 2024 Jun; 28(6):3269-3278. PubMed ID: 38656852
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Collaborative Ehealth Privacy and Security: An Access Control With Attribute Revocation Based on OBDD Access Structure.
    Edemacu K; Jang B; Kim JW
    IEEE J Biomed Health Inform; 2020 Oct; 24(10):2960-2972. PubMed ID: 32071017
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 7.