BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

128 related articles for article (PubMed ID: 25202737)

  • 1. Time pattern locking scheme for secure multimedia contents in human-centric device.
    Kim HW; Kim JH; Park JH; Jeong YS
    ScientificWorldJournal; 2014; 2014():796515. PubMed ID: 25202737
    [TBL] [Abstract][Full Text] [Related]  

  • 2. A rhythm-based authentication scheme for smart media devices.
    Lee JD; Jeong YS; Park JH
    ScientificWorldJournal; 2014; 2014():781014. PubMed ID: 25110743
    [TBL] [Abstract][Full Text] [Related]  

  • 3. A Fractal-Based Authentication Technique Using Sierpinski Triangles in Smart Devices.
    Ali A; Rafique H; Arshad T; Alqarni MA; Chauhdary SH; Bashir AK
    Sensors (Basel); 2019 Feb; 19(3):. PubMed ID: 30736448
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Sensor based framework for secure multimedia communication in VANET.
    Rahim A; Khan ZS; Bin Muhaya FT; Sher M; Kim TH
    Sensors (Basel); 2010; 10(11):10146-54. PubMed ID: 22163462
    [TBL] [Abstract][Full Text] [Related]  

  • 5. A secure and efficient password-based user authentication scheme using smart cards for the integrated EPR information system.
    Lee TF; Chang IP; Lin TH; Wang CC
    J Med Syst; 2013 Jun; 37(3):9941. PubMed ID: 23553734
    [TBL] [Abstract][Full Text] [Related]  

  • 6. A secure cluster-based multipath routing protocol for WMSNs.
    Almalkawi IT; Zapata MG; Al-Karaki JN
    Sensors (Basel); 2011; 11(4):4401-24. PubMed ID: 22163854
    [TBL] [Abstract][Full Text] [Related]  

  • 7. An enhanced password authentication scheme for session initiation protocol with perfect forward secrecy.
    Qiu S; Xu G; Ahmad H; Guo Y
    PLoS One; 2018; 13(3):e0194072. PubMed ID: 29547619
    [TBL] [Abstract][Full Text] [Related]  

  • 8. A game-theoretical approach to multimedia social networks security.
    Liu E; Liu Z; Shao F; Zhang Z
    ScientificWorldJournal; 2014; 2014():791690. PubMed ID: 24977226
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Security enhanced multi-factor biometric authentication scheme using bio-hash function.
    Choi Y; Lee Y; Moon J; Won D
    PLoS One; 2017; 12(5):e0176250. PubMed ID: 28459867
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Cryptanalysis and security improvements of 'two-factor user authentication in wireless sensor networks'.
    Khan MK; Alghathbar K
    Sensors (Basel); 2010; 10(3):2450-9. PubMed ID: 22294935
    [TBL] [Abstract][Full Text] [Related]  

  • 11. A secure and robust password-based remote user authentication scheme using smart cards for the integrated EPR information system.
    Das AK
    J Med Syst; 2015 Mar; 39(3):25. PubMed ID: 25666924
    [TBL] [Abstract][Full Text] [Related]  

  • 12. On the security of two remote user authentication schemes for telecare medical information systems.
    Kim KW; Lee JD
    J Med Syst; 2014 May; 38(5):17. PubMed ID: 24777588
    [TBL] [Abstract][Full Text] [Related]  

  • 13. A Multiserver Biometric Authentication Scheme for TMIS using Elliptic Curve Cryptography.
    Chaudhry SA; Khan MT; Khan MK; Shon T
    J Med Syst; 2016 Nov; 40(11):230. PubMed ID: 27646969
    [TBL] [Abstract][Full Text] [Related]  

  • 14. A user authentication scheme using physiological and behavioral biometrics for multitouch devices.
    Koong CS; Yang TI; Tseng CC
    ScientificWorldJournal; 2014; 2014():781234. PubMed ID: 25147864
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Design and Analysis of an Enhanced Patient-Server Mutual Authentication Protocol for Telecare Medical Information System.
    Amin R; Islam SK; Biswas GP; Khan MK; Obaidat MS
    J Med Syst; 2015 Nov; 39(11):137. PubMed ID: 26324169
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Continuous Authentication against Collusion Attacks.
    Lyu P; Cai W; Wang Y
    Sensors (Basel); 2022 Jun; 22(13):. PubMed ID: 35808208
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Authentication of Smartphone Users Based on Activity Recognition and Mobile Sensing.
    Ehatisham-Ul-Haq M; Azam MA; Loo J; Shuang K; Islam S; Naeem U; Amin Y
    Sensors (Basel); 2017 Sep; 17(9):. PubMed ID: 28878177
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Invisible touch sensors-based smart and disposable door locking system for security applications.
    Mehmood MQ; Malik MS; Zulfiqar MH; Khan MA; Zubair M; Massoud Y
    Heliyon; 2023 Feb; 9(2):e13586. PubMed ID: 36846675
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Protecting contacts against privacy leaks in smartphones.
    Cha Y; Pak W
    PLoS One; 2018; 13(7):e0191502. PubMed ID: 29995881
    [TBL] [Abstract][Full Text] [Related]  

  • 20. A joint signal processing and cryptographic approach to multimedia encryption.
    Mao Y; Wu M
    IEEE Trans Image Process; 2006 Jul; 15(7):2061-75. PubMed ID: 16830924
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 7.