These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

124 related articles for article (PubMed ID: 26823196)

  • 1. Quantum Hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption.
    Yang YG; Xu P; Yang R; Zhou YH; Shi WM
    Sci Rep; 2016 Jan; 6():19788. PubMed ID: 26823196
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Novel image encryption based on quantum walks.
    Yang YG; Pan QX; Sun SJ; Xu P
    Sci Rep; 2015 Jan; 5():7784. PubMed ID: 25586889
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Face privacy protection scheme by security-enhanced encryption structure and nonlinear dynamics.
    Xie Z; Lin Y; Liu T; Wen H
    iScience; 2024 Sep; 27(9):110768. PubMed ID: 39286501
    [TBL] [Abstract][Full Text] [Related]  

  • 4. A double encryption protection algorithm for stem cell bank privacy data based on improved AES and chaotic encryption technology.
    Wang L; Wei X; Zhang Y; Gao Y; Niu Q
    PLoS One; 2023; 18(10):e0293418. PubMed ID: 37878640
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Quantum Image Encryption Scheme Using Arnold Transform and S-box Scrambling.
    Liu H; Zhao B; Huang L
    Entropy (Basel); 2019 Mar; 21(4):. PubMed ID: 33267057
    [TBL] [Abstract][Full Text] [Related]  

  • 6. A Hash-Based Quantum-Resistant Chameleon Signature Scheme.
    Thanalakshmi P; Anitha R; Anbazhagan N; Cho W; Joshi GP; Yang E
    Sensors (Basel); 2021 Dec; 21(24):. PubMed ID: 34960507
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Authenticated Public Key Elliptic Curve Based on Deep Convolutional Neural Network for Cybersecurity Image Encryption Application.
    Hagras EAA; Aldosary S; Khaled H; Hassan TM
    Sensors (Basel); 2023 Jul; 23(14):. PubMed ID: 37514882
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Authentication of variable length messages in quantum key distribution.
    Bibak K; Kapron BM; Srinivasan V
    EPJ Quantum Technol; 2022; 9(1):8. PubMed ID: 35224512
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Dynamic feedback bit-level image privacy protection based on chaos and information hiding.
    Zhang J; Wen H
    Sci Rep; 2024 Mar; 14(1):5742. PubMed ID: 38459067
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Novel pseudo-random number generator based on quantum random walks.
    Yang YG; Zhao QQ
    Sci Rep; 2016 Feb; 6():20362. PubMed ID: 26842402
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Multi-Image Encryption Algorithm Based on Cascaded Modulation Chaotic System and Block-Scrambling-Diffusion.
    Wang T; Ge B; Xia C; Dai G
    Entropy (Basel); 2022 Jul; 24(8):. PubMed ID: 36010719
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Optical single-channel color image encryption based on chaotic fingerprint phase mask and diffractive imaging.
    Wang Y; Zhao Q; Zhang H; Li T; Xu W; Liu S; Su Y
    Appl Opt; 2023 Feb; 62(4):1009-1018. PubMed ID: 36821155
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Chaotic image encryption algorithm with improved bonobo optimizer and DNA coding for enhanced security.
    Almasoud AS; Alabduallah B; Alqahtani H; Aljameel SS; Alotaibi SS; Mohamed A
    Heliyon; 2024 Feb; 10(3):e25257. PubMed ID: 38327435
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Image Security Based on Three-Dimensional Chaotic System and Random Dynamic Selection.
    Ran B; Zhang T; Wang L; Liu S; Zhou X
    Entropy (Basel); 2022 Jul; 24(7):. PubMed ID: 35885181
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Image Encryption Based on Hopfield Neural Network and Bidirectional Flipping.
    Zhang H; Yang S
    Comput Intell Neurosci; 2022; 2022():7941448. PubMed ID: 35186070
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Secure CT-Image Encryption for COVID-19 Infections Using HBBS-Based Multiple Key-Streams.
    Reyad O; Karar ME
    Arab J Sci Eng; 2021; 46(4):3581-3593. PubMed ID: 33425645
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Quantum-inspired cascaded discrete-time quantum walks with induced chaotic dynamics and cryptographic applications.
    Abd El-Latif AA; Abd-El-Atty B; Amin M; Iliyasu AM
    Sci Rep; 2020 Feb; 10(1):1930. PubMed ID: 32029798
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Coupling Quantum Random Walks with Long- and Short-Term Memory for High Pixel Image Encryption Schemes.
    Liang J; Song Z; Sun Z; Lv M; Ma H
    Entropy (Basel); 2023 Feb; 25(2):. PubMed ID: 36832719
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Quantum hash function based on controlled alternate lively quantum walks.
    Hou P; Shang T; Zhang Y; Tang Y; Liu J
    Sci Rep; 2023 Apr; 13(1):5887. PubMed ID: 37041296
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Image Encryption Using a Spectrally Efficient Halton Logistics Tent (HaLT) Map and DNA Encoding for Secured Image Communication.
    Patel S; Veeramalai T
    Entropy (Basel); 2022 Jun; 24(6):. PubMed ID: 35741524
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 7.