BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

231 related articles for article (PubMed ID: 25384009)

  • 1. A provably-secure ECC-based authentication scheme for wireless sensor networks.
    Nam J; Kim M; Paik J; Lee Y; Won D
    Sensors (Basel); 2014 Nov; 14(11):21023-44. PubMed ID: 25384009
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation.
    Nam J; Choo KK; Han S; Kim M; Paik J; Won D
    PLoS One; 2015; 10(4):e0116709. PubMed ID: 25849359
    [TBL] [Abstract][Full Text] [Related]  

  • 3. An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System.
    Li CT; Wu TY; Chen CL; Lee CC; Chen CM
    Sensors (Basel); 2017 Jun; 17(7):. PubMed ID: 28644381
    [TBL] [Abstract][Full Text] [Related]  

  • 4. ECC-based three-factor authentication and key agreement scheme for wireless sensor networks.
    Huang W
    Sci Rep; 2024 Jan; 14(1):1787. PubMed ID: 38245561
    [TBL] [Abstract][Full Text] [Related]  

  • 5. A New Privacy-Preserving Handover Authentication Scheme for Wireless Networks.
    Wang C; Yuan Y; Wu J
    Sensors (Basel); 2017 Jun; 17(6):. PubMed ID: 28632171
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Improving Biometric-Based Authentication Schemes with Smart Card Revocation/Reissue for Wireless Sensor Networks.
    Moon J; Lee D; Lee Y; Won D
    Sensors (Basel); 2017 Apr; 17(5):. PubMed ID: 28441331
    [TBL] [Abstract][Full Text] [Related]  

  • 7. An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks.
    Lu Y; Li L; Peng H; Yang Y
    Sensors (Basel); 2016 Jun; 16(6):. PubMed ID: 27338382
    [TBL] [Abstract][Full Text] [Related]  

  • 8. SLUA-WSN: Secure and Lightweight Three-Factor-Based User Authentication Protocol for Wireless Sensor Networks.
    Yu S; Park Y
    Sensors (Basel); 2020 Jul; 20(15):. PubMed ID: 32722503
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Three-Factor User Authentication and Key Agreement Using Elliptic Curve Cryptosystem in Wireless Sensor Networks.
    Park Y; Park Y
    Sensors (Basel); 2016 Dec; 16(12):. PubMed ID: 27983616
    [TBL] [Abstract][Full Text] [Related]  

  • 10. RUASN: a robust user authentication framework for wireless sensor networks.
    Kumar P; Choudhury AJ; Sain M; Lee SG; Lee HJ
    Sensors (Basel); 2011; 11(5):5020-46. PubMed ID: 22163888
    [TBL] [Abstract][Full Text] [Related]  

  • 11. A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks.
    Chen H; Ge L; Xie L
    Sensors (Basel); 2015 Jul; 15(7):17057-75. PubMed ID: 26184224
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Secure Authentication Protocol for Wireless Sensor Networks in Vehicular Communications.
    Yu S; Lee J; Lee K; Park K; Park Y
    Sensors (Basel); 2018 Sep; 18(10):. PubMed ID: 30248898
    [TBL] [Abstract][Full Text] [Related]  

  • 13. An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks.
    Jung J; Kim J; Choi Y; Won D
    Sensors (Basel); 2016 Aug; 16(8):. PubMed ID: 27537890
    [TBL] [Abstract][Full Text] [Related]  

  • 14. A Lightweight Three-Factor Authentication and Key Agreement Scheme in Wireless Sensor Networks for Smart Homes.
    Shin S; Kwon T
    Sensors (Basel); 2019 Apr; 19(9):. PubMed ID: 31035690
    [TBL] [Abstract][Full Text] [Related]  

  • 15. WSN-SLAP: Secure and Lightweight Mutual Authentication Protocol for Wireless Sensor Networks.
    Kwon DK; Yu SJ; Lee JY; Son SH; Park YH
    Sensors (Basel); 2021 Jan; 21(3):. PubMed ID: 33573308
    [TBL] [Abstract][Full Text] [Related]  

  • 16. An Enhanced Three-Factor User Authentication Scheme Using Elliptic Curve Cryptosystem for Wireless Sensor Networks.
    Wang C; Xu G; Sun J
    Sensors (Basel); 2017 Dec; 17(12):. PubMed ID: 29257066
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Efficient and Secure Temporal Credential-Based Authenticated Key Agreement Using Extended Chaotic Maps for Wireless Sensor Networks.
    Lee TF
    Sensors (Basel); 2015 Jun; 15(7):14960-80. PubMed ID: 26121612
    [TBL] [Abstract][Full Text] [Related]  

  • 18. A Multi-Server Two-Factor Authentication Scheme with Un-Traceability Using Elliptic Curve Cryptography.
    Xu G; Qiu S; Ahmad H; Xu G; Guo Y; Zhang M; Xu H
    Sensors (Basel); 2018 Jul; 18(7):. PubMed ID: 30041475
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Robust ECC-based authenticated key agreement scheme with privacy protection for Telecare medicine information systems.
    Zhang L; Zhu S
    J Med Syst; 2015 May; 39(5):49. PubMed ID: 25732081
    [TBL] [Abstract][Full Text] [Related]  

  • 20. A robust and effective smart-card-based remote user authentication mechanism using hash function.
    Das AK; Odelu V; Goswami A
    ScientificWorldJournal; 2014; 2014():719470. PubMed ID: 24892078
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 12.