These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

87 related articles for article (PubMed ID: 25815879)

  • 21. Efficient routing strategies in scale-free networks with limited bandwidth.
    Tang M; Zhou T
    Phys Rev E Stat Nonlin Soft Matter Phys; 2011 Aug; 84(2 Pt 2):026116. PubMed ID: 21929073
    [TBL] [Abstract][Full Text] [Related]  

  • 22. CENTERA: a centralized trust-based efficient routing protocol with authentication for wireless sensor networks.
    Tajeddine A; Kayssi A; Chehab A; Elhajj I; Itani W
    Sensors (Basel); 2015 Feb; 15(2):3299-333. PubMed ID: 25648712
    [TBL] [Abstract][Full Text] [Related]  

  • 23. Energy Efficient Link Aware Routing with Power Control in Wireless Ad Hoc Networks.
    Katiravan J; Sylvia D; Rao DS
    ScientificWorldJournal; 2015; 2015():576754. PubMed ID: 26167529
    [TBL] [Abstract][Full Text] [Related]  

  • 24. Towards attack tolerant networks: Concurrent multipath routing and the butterfly network.
    Platt EL; Romero DM
    PLoS One; 2019; 14(4):e0214292. PubMed ID: 30943216
    [TBL] [Abstract][Full Text] [Related]  

  • 25. Unbounded and revocable hierarchical identity-based encryption with adaptive security, decryption key exposure resistant, and short public parameters.
    Xing Q; Wang B; Wang X; Tao J
    PLoS One; 2018; 13(4):e0195204. PubMed ID: 29649326
    [TBL] [Abstract][Full Text] [Related]  

  • 26. Compact FPGA hardware architecture for public key encryption in embedded devices.
    Rodríguez-Flores L; Morales-Sandoval M; Cumplido R; Feregrino-Uribe C; Algredo-Badillo I
    PLoS One; 2018; 13(1):e0190939. PubMed ID: 29360824
    [TBL] [Abstract][Full Text] [Related]  

  • 27. Secure Data Aggregation with Fully Homomorphic Encryption in Large-Scale Wireless Sensor Networks.
    Li X; Chen D; Li C; Wang L
    Sensors (Basel); 2015 Jul; 15(7):15952-73. PubMed ID: 26151208
    [TBL] [Abstract][Full Text] [Related]  

  • 28. Security aspects of medical file regrouping for the epidemiological follow-up.
    Quantin C; Kerkri E; Allaert FA; Bouzelat H; Dusserre L
    Stud Health Technol Inform; 1998; 52 Pt 2():1135-7. PubMed ID: 10384636
    [TBL] [Abstract][Full Text] [Related]  

  • 29. Lightweight and confidential data discovery and dissemination for wireless body area networks.
    He D; Chan S; Zhang Y; Yang H
    IEEE J Biomed Health Inform; 2014 Mar; 18(2):440-8. PubMed ID: 24608049
    [TBL] [Abstract][Full Text] [Related]  

  • 30. An efficient and secure medical image protection scheme based on chaotic maps.
    Fu C; Meng WH; Zhan YF; Zhu ZL; Lau FC; Tse CK; Ma HF
    Comput Biol Med; 2013 Sep; 43(8):1000-10. PubMed ID: 23816172
    [TBL] [Abstract][Full Text] [Related]  

  • 31. A Scalable Context-Aware Objective Function (SCAOF) of Routing Protocol for Agricultural Low-Power and Lossy Networks (RPAL).
    Chen Y; Chanet JP; Hou KM; Shi H; de Sousa G
    Sensors (Basel); 2015 Aug; 15(8):19507-40. PubMed ID: 26266411
    [TBL] [Abstract][Full Text] [Related]  

  • 32. Modeling and Simulation of a Novel Relay Node Based Secure Routing Protocol Using Multiple Mobile Sink for Wireless Sensor Networks.
    Perumal M; Dhandapani S
    ScientificWorldJournal; 2015; 2015():495945. PubMed ID: 26495426
    [TBL] [Abstract][Full Text] [Related]  

  • 33. Counterfactual Anonymous Quantum Teleportation in the Presence of Adversarial Attacks and Channel Noise.
    Nang Paing S; Setiawan JW; Tariq S; Talha Rahim M; Lee K; Shin H
    Sensors (Basel); 2022 Oct; 22(19):. PubMed ID: 36236686
    [TBL] [Abstract][Full Text] [Related]  

  • 34. Safeguarding your electronic identity with encryption.
    Wagner E
    Health Phys; 1999 Sep; 77(3):245-6. PubMed ID: 10456494
    [No Abstract]   [Full Text] [Related]  

  • 35. Securing electronic health records with novel mobile encryption schemes.
    Weerasinghe D; Elmufti K; Rajarajan M; Rakocevic V
    Int J Electron Healthc; 2007; 3(4):395-416. PubMed ID: 18048274
    [TBL] [Abstract][Full Text] [Related]  

  • 36. Dynamic source routing strategy for two-level flows on scale-free networks.
    Jiang ZY; Liang MG; Wu JJ
    PLoS One; 2013; 8(12):e82162. PubMed ID: 24349207
    [TBL] [Abstract][Full Text] [Related]  

  • 37. A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation.
    Rahayu TM; Lee SG; Lee HJ
    Sensors (Basel); 2015 Jun; 15(7):15127-58. PubMed ID: 26131669
    [TBL] [Abstract][Full Text] [Related]  

  • 38. CCS-DTN: clustering and network coding-based efficient routing in social DTNs.
    Zhang Z; Ma M; Jin Z
    Sensors (Basel); 2014 Dec; 15(1):285-303. PubMed ID: 25609047
    [TBL] [Abstract][Full Text] [Related]  

  • 39. Collusion-aware privacy-preserving range query in tiered wireless sensor networks.
    Zhang X; Dong L; Peng H; Chen H; Zhao S; Li C
    Sensors (Basel); 2014 Dec; 14(12):23905-32. PubMed ID: 25615731
    [TBL] [Abstract][Full Text] [Related]  

  • 40. Game-theoretic approach for improving cooperation in wireless multihop networks.
    Ng SK; Seah WK
    IEEE Trans Syst Man Cybern B Cybern; 2010 Jun; 40(3):559-74. PubMed ID: 20211801
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 5.