These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

215 related articles for article (PubMed ID: 27136550)

  • 1. Exponential Arithmetic Based Self-Healing Group Key Distribution Scheme with Backward Secrecy under the Resource-Constrained Wireless Networks.
    Guo H; Zheng Y; Zhang X; Li Z
    Sensors (Basel); 2016 Apr; 16(5):. PubMed ID: 27136550
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Improved one-way hash chain and revocation polynomial-based self-healing group key distribution schemes in resource-constrained wireless networks.
    Chen H; Xie L
    Sensors (Basel); 2014 Dec; 14(12):24358-80. PubMed ID: 25529204
    [TBL] [Abstract][Full Text] [Related]  

  • 3. A Note on an Improved Self-Healing Group Key Distribution Scheme.
    Guo H; Zheng Y; Wang B; Li Z
    Sensors (Basel); 2015 Sep; 15(10):25033-8. PubMed ID: 26426018
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Butterfly Encryption Scheme for Resource-Constrained Wireless Networks.
    Sampangi RV; Sampalli S
    Sensors (Basel); 2015 Sep; 15(9):23145-67. PubMed ID: 26389899
    [TBL] [Abstract][Full Text] [Related]  

  • 5. A Polynomial Subset-Based Efficient Multi-Party Key Management System for Lightweight Device Networks.
    Mahmood Z; Ning H; Ghafoor A
    Sensors (Basel); 2017 Mar; 17(4):. PubMed ID: 28338632
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Secure Multiuser Communications in Wireless Sensor Networks with TAS and Cooperative Jamming.
    Yang M; Zhang B; Huang Y; Yang N; Guo D; Gao B
    Sensors (Basel); 2016 Nov; 16(11):. PubMed ID: 27845753
    [TBL] [Abstract][Full Text] [Related]  

  • 7. A New Privacy-Preserving Handover Authentication Scheme for Wireless Networks.
    Wang C; Yuan Y; Wu J
    Sensors (Basel); 2017 Jun; 17(6):. PubMed ID: 28632171
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Efficient and Secure Key Distribution Protocol for Wireless Sensor Networks.
    Alshammari MR; Elleithy KM
    Sensors (Basel); 2018 Oct; 18(10):. PubMed ID: 30347886
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Dynamic coefficient symmetric polynomial-based secure key management scheme for Internet of Things (IoT) networks.
    Liu Z; Luo Y
    PeerJ Comput Sci; 2023; 9():e1726. PubMed ID: 38192450
    [TBL] [Abstract][Full Text] [Related]  

  • 10. A novel and lightweight system to secure wireless medical sensor networks.
    He D; Chan S; Tang S
    IEEE J Biomed Health Inform; 2014 Jan; 18(1):316-26. PubMed ID: 24403430
    [TBL] [Abstract][Full Text] [Related]  

  • 11. An Asymmetric Encryption-Based Key Distribution Method for Wireless Sensor Networks.
    Cheng Y; Liu Y; Zhang Z; Li Y
    Sensors (Basel); 2023 Jul; 23(14):. PubMed ID: 37514753
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Secure Communications in CIoT Networks with a Wireless Energy Harvesting Untrusted Relay.
    Hu H; Gao Z; Liao X; Leung VCM
    Sensors (Basel); 2017 Sep; 17(9):. PubMed ID: 28869540
    [TBL] [Abstract][Full Text] [Related]  

  • 13. A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks.
    Chen H; Ge L; Xie L
    Sensors (Basel); 2015 Jul; 15(7):17057-75. PubMed ID: 26184224
    [TBL] [Abstract][Full Text] [Related]  

  • 14. A multihop key agreement scheme for wireless ad hoc networks based on channel characteristics.
    Hao Z; Zhong S; Yu N
    ScientificWorldJournal; 2013; 2013():935604. PubMed ID: 23766725
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Enhancing LoRaWAN Security through a Lightweight and Authenticated Key Management Approach.
    Sanchez-Iborra R; Sánchez-Gómez J; Pérez S; Fernández PJ; Santa J; Hernández-Ramos JL; Skarmeta AF
    Sensors (Basel); 2018 Jun; 18(6):. PubMed ID: 29874839
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Provably Secure Receiver-Unrestricted Group Key Management Scheme for Mobile Ad Hoc Networks.
    Zhang R; Han W; Zhang L; Wang L; Meng X
    Sensors (Basel); 2023 Apr; 23(9):. PubMed ID: 37177401
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Localization-Free Detection of Replica Node Attacks in Wireless Sensor Networks Using Similarity Estimation with Group Deployment Knowledge.
    Ding C; Yang L; Wu M
    Sensors (Basel); 2017 Jan; 17(1):. PubMed ID: 28098846
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Fast, Resource-Saving, and Anti-Collaborative Attack Trust Computing Scheme Based on Cross-Validation for Clustered Wireless Sensor Networks.
    Liu C; Li X
    Sensors (Basel); 2020 Mar; 20(6):. PubMed ID: 32178445
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Secrecy Performance Analysis of Cooperative Multihop Transmission for WSNs under Eavesdropping Attacks.
    Triwidyastuti Y; Perdana RHY; Shim K; An B
    Sensors (Basel); 2023 Sep; 23(17):. PubMed ID: 37688109
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Secure Polar Coding for the Primitive Relay Wiretap Channel.
    Athanasakos M; Karagiannidis G
    Entropy (Basel); 2021 Apr; 23(4):. PubMed ID: 33918817
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 11.