BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

106 related articles for article (PubMed ID: 25993247)

  • 1. Security analysis of the unrestricted identity-based aggregate signature scheme.
    Lee K; Lee DH
    PLoS One; 2015; 10(5):e0128081. PubMed ID: 25993247
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Efficient unrestricted identity-based aggregate signature scheme.
    Yuan Y; Zhan Q; Huang H
    PLoS One; 2014; 9(10):e110100. PubMed ID: 25329777
    [TBL] [Abstract][Full Text] [Related]  

  • 3. A short certificateless aggregate signature against coalition attacks.
    Yang X; Wang J; Ma T; Li Y; Wang C
    PLoS One; 2018; 13(12):e0205453. PubMed ID: 30540746
    [TBL] [Abstract][Full Text] [Related]  

  • 4. An Aggregate Signature Scheme Based on a Trapdoor Hash Function for the Internet of Things.
    Shu H; Chen F; Xie D; Sun L; Qi P; Huang Y
    Sensors (Basel); 2019 Sep; 19(19):. PubMed ID: 31569570
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Efficiently Multi-User Searchable Encryption Scheme with Attribute Revocation and Grant for Cloud Storage.
    Wang S; Zhang X; Zhang Y
    PLoS One; 2016; 11(11):e0167157. PubMed ID: 27898703
    [TBL] [Abstract][Full Text] [Related]  

  • 6. An enhanced pairing-free certificateless directed signature scheme.
    Yang K
    PLoS One; 2022; 17(2):e0263943. PubMed ID: 35176087
    [TBL] [Abstract][Full Text] [Related]  

  • 7. A secure and efficient certificateless content extraction signature with privacy protection.
    Zhao C; Liu J; Zheng F; Wang D; Meng B
    PLoS One; 2021; 16(11):e0258907. PubMed ID: 34723998
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Improving the proof of "Privacy-preserving attribute-keyword based data publish-subscribe service on cloud platforms".
    Wang S; Zhang Q; Zhang Y; Sun J; Chen J; Sun X
    PLoS One; 2019; 14(2):e0212761. PubMed ID: 30802275
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Revocable identity-based proxy re-signature against signing key exposure.
    Yang X; Chen C; Ma T; Wang J; Wang C
    PLoS One; 2018; 13(3):e0194783. PubMed ID: 29579125
    [TBL] [Abstract][Full Text] [Related]  

  • 10. A data-sharing scheme that supports multi-keyword search for electronic medical records.
    Niu S; Liu W; Han S; Fang L
    PLoS One; 2021; 16(1):e0244979. PubMed ID: 33411842
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Fractional chaotic maps based short signature scheme under human-centered IoT environments.
    Meshram C; Ibrahim RW; Obaid AJ; Meshram SG; Meshram A; El-Latif AMA
    J Adv Res; 2021 Sep; 32():139-148. PubMed ID: 34484833
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Searchable attribute-based encryption scheme with attribute revocation in cloud storage.
    Wang S; Zhao D; Zhang Y
    PLoS One; 2017; 12(8):e0183459. PubMed ID: 28859125
    [TBL] [Abstract][Full Text] [Related]  

  • 13. On the security of a novel probabilistic signature based on bilinear square Diffie-Hellman problem and its extension.
    Zhao Z; Shi W
    ScientificWorldJournal; 2014; 2014():345686. PubMed ID: 25025083
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Efficient Linkable Ring Signature Scheme over NTRU Lattice with Unconditional Anonymity.
    Ye Q; Wang M; Meng H; Xia F; Yan X
    Comput Intell Neurosci; 2022; 2022():8431874. PubMed ID: 35602625
    [TBL] [Abstract][Full Text] [Related]  

  • 15. An efficient heterogeneous signcryption for smart grid.
    Jin C; Chen G; Yu C; Shan J; Zhao J; Jin Y
    PLoS One; 2018; 13(12):e0208311. PubMed ID: 30562351
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Secure SCADA communication by using a modified key management scheme.
    Rezai A; Keshavarzi P; Moravej Z
    ISA Trans; 2013 Jul; 52(4):517-24. PubMed ID: 23528753
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Secure Obfuscation for Encrypted Group Signatures.
    Shi Y; Zhao Q; Fan H; Liu Q
    PLoS One; 2015; 10(7):e0131550. PubMed ID: 26167686
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Possibility of decryption speed-up by parallel processing in CCA secure hashed ElGamal.
    Kim GC; Ji HA; Jong YB; Kim GH; Kim HS
    PLoS One; 2023; 18(11):e0294840. PubMed ID: 38032979
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Efficient attribute-based strong designated verifier signature scheme based on elliptic curve cryptography.
    Ma R; Du L
    PLoS One; 2024; 19(5):e0300153. PubMed ID: 38722905
    [TBL] [Abstract][Full Text] [Related]  

  • 20. PSDAAP: Provably Secure Data Authenticated Aggregation Protocols Using Identity-Based Multi-Signature in Marine WSNs.
    Wei L; Zhang L; Huang D; Zhang K; Dai L; Wu G
    Sensors (Basel); 2017 Sep; 17(9):. PubMed ID: 28906439
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 6.