These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
132 related articles for article (PubMed ID: 26167686)
1. Secure Obfuscation for Encrypted Group Signatures. Shi Y; Zhao Q; Fan H; Liu Q PLoS One; 2015; 10(7):e0131550. PubMed ID: 26167686 [TBL] [Abstract][Full Text] [Related]
2. Obfuscating encrypted threshold signature algorithm and its applications in cloud computing. Li Y; Wei J; Wu B; Wang C; Wang C; Zhang Y; Yang X PLoS One; 2021; 16(4):e0250259. PubMed ID: 33861767 [TBL] [Abstract][Full Text] [Related]
3. Obfuscatable multi-recipient re-encryption for secure privacy-preserving personal health record services. Shi Y; Fan H; Xiong G Technol Health Care; 2015; 23 Suppl 1():S139-45. PubMed ID: 26410316 [TBL] [Abstract][Full Text] [Related]
4. Revocable identity-based proxy re-signature against signing key exposure. Yang X; Chen C; Ma T; Wang J; Wang C PLoS One; 2018; 13(3):e0194783. PubMed ID: 29579125 [TBL] [Abstract][Full Text] [Related]
5. Provably secure identity-based identification and signature schemes from code assumptions. Song B; Zhao Y PLoS One; 2017; 12(8):e0182894. PubMed ID: 28809940 [TBL] [Abstract][Full Text] [Related]
6. Security analysis of the unrestricted identity-based aggregate signature scheme. Lee K; Lee DH PLoS One; 2015; 10(5):e0128081. PubMed ID: 25993247 [TBL] [Abstract][Full Text] [Related]
7. Research on Quantum-Attack-Resistant Strong Forward-Secure Signature Schemes. Li F; Wang J; Shang M; Zhang D; Li T Entropy (Basel); 2023 Aug; 25(8):. PubMed ID: 37628189 [TBL] [Abstract][Full Text] [Related]
9. Post-Quantum Secure Identity-Based Proxy Blind Signature Scheme on a Lattice. Li F; Yang M; Song Z; Wang P; Li G Entropy (Basel); 2023 Aug; 25(8):. PubMed ID: 37628187 [TBL] [Abstract][Full Text] [Related]
10. AES Based White Box Cryptography in Digital Signature Verification. Shukla PK; Aljaedi A; Pareek PK; Alharbi AR; Jamal SS Sensors (Basel); 2022 Dec; 22(23):. PubMed ID: 36502144 [TBL] [Abstract][Full Text] [Related]
11. A secure and efficient certificateless content extraction signature with privacy protection. Zhao C; Liu J; Zheng F; Wang D; Meng B PLoS One; 2021; 16(11):e0258907. PubMed ID: 34723998 [TBL] [Abstract][Full Text] [Related]
12. Private predictive analysis on encrypted medical data. Bos JW; Lauter K; Naehrig M J Biomed Inform; 2014 Aug; 50():234-43. PubMed ID: 24835616 [TBL] [Abstract][Full Text] [Related]
13. A Generic Construction of Integrated Secure-Channel Free PEKS and PKE and its Application to EMRs in Cloud Storage. Suzuki T; Emura K; Ohigashi T J Med Syst; 2019 Mar; 43(5):128. PubMed ID: 30923926 [TBL] [Abstract][Full Text] [Related]
14. Secure construction of k-unlinkable patient records from distributed providers. Malin B Artif Intell Med; 2010 Jan; 48(1):29-41. PubMed ID: 19875273 [TBL] [Abstract][Full Text] [Related]
16. Secure Similar Patients Query on Encrypted Genomic Data. Mahdi MSR; Al Aziz MM; Alhadidi D; Mohammed N IEEE J Biomed Health Inform; 2019 Nov; 23(6):2611-2618. PubMed ID: 30442622 [TBL] [Abstract][Full Text] [Related]
17. Forward secure digital signature for electronic medical records. Yu YC; Huang TY; Hou TW J Med Syst; 2012 Apr; 36(2):399-406. PubMed ID: 20703711 [TBL] [Abstract][Full Text] [Related]
18. Image feature extraction in encrypted domain with privacy-preserving SIFT. Hsu CY; Lu CS; Pei SC IEEE Trans Image Process; 2012 Nov; 21(11):4593-607. PubMed ID: 22711774 [TBL] [Abstract][Full Text] [Related]
19. Sensor data security level estimation scheme for wireless sensor networks. Ramos A; Filho RH Sensors (Basel); 2015 Jan; 15(1):2104-36. PubMed ID: 25608215 [TBL] [Abstract][Full Text] [Related]
20. An Identity-Based (IDB) Broadcast Encryption Scheme with Personalized Messages (BEPM). Xu K; Liao Y; Qiao L; Liu Z; Yang X PLoS One; 2015; 10(12):e0143975. PubMed ID: 26629817 [TBL] [Abstract][Full Text] [Related] [Next] [New Search]