These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

95 related articles for article (PubMed ID: 27564373)

  • 1. Constructing Pairing-Friendly Elliptic Curves under Embedding Degree 1 for Securing Critical Infrastructures.
    Wang M; Dai G; Choo KK; Jayaraman PP; Ranjan R
    PLoS One; 2016; 11(8):e0161857. PubMed ID: 27564373
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Security analysis of elliptic curves with embedding degree 1 proposed in PLOS ONE 2016.
    Teruya T
    PLoS One; 2019; 14(2):e0212310. PubMed ID: 30779766
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Report on Pairing-based Cryptography.
    Moody D; Peralta R; Perlner R; Regenscheid A; Roginsky A; Chen L
    J Res Natl Inst Stand Technol; 2015; 120():11-27. PubMed ID: 26958435
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Efficient attribute-based strong designated verifier signature scheme based on elliptic curve cryptography.
    Ma R; Du L
    PLoS One; 2024; 19(5):e0300153. PubMed ID: 38722905
    [TBL] [Abstract][Full Text] [Related]  

  • 5. SecDedoop: Secure Deduplication with Access Control of Big Data in the HDFS/Hadoop Environment.
    Ramya P; Sundar C
    Big Data; 2020 Apr; 8(2):147-163. PubMed ID: 32319799
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Parallel point-multiplication architecture using combined group operations for high-speed cryptographic applications.
    Hossain MS; Saeedi E; Kong Y
    PLoS One; 2017; 12(5):e0176214. PubMed ID: 28459831
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Quality optimized medical image information hiding algorithm that employs edge detection and data coding.
    Al-Dmour H; Al-Ani A
    Comput Methods Programs Biomed; 2016 Apr; 127():24-43. PubMed ID: 27000287
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Efficient and provable secure pairing-free security-mediated identity-based identification schemes.
    Chin JJ; Tan SY; Heng SH; Phan RC
    ScientificWorldJournal; 2014; 2014():170906. PubMed ID: 25207333
    [TBL] [Abstract][Full Text] [Related]  

  • 9. An enhanced biometric-based authentication scheme for telecare medicine information systems using elliptic curve cryptosystem.
    Lu Y; Li L; Peng H; Yang Y
    J Med Syst; 2015 Mar; 39(3):32. PubMed ID: 25681101
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Algorithms for Lightweight Key Exchange.
    Alvarez R; Caballero-Gil C; Santonja J; Zamora A
    Sensors (Basel); 2017 Jun; 17(7):. PubMed ID: 28654006
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Elliptic Curve Cryptography Considerations for Securing Automation and SCADA Systems.
    Tidrea A; Korodi A; Silea I
    Sensors (Basel); 2023 Mar; 23(5):. PubMed ID: 36904888
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Elliptic Curve Cryptography for Wireless Sensor Networks Using the Number Theoretic Transform.
    Gulen U; Baktir S
    Sensors (Basel); 2020 Mar; 20(5):. PubMed ID: 32182915
    [TBL] [Abstract][Full Text] [Related]  

  • 13. iTrust-A Trustworthy and Efficient Mapping Scheme in Elliptic Curve Cryptography.
    Almajed H; Almogren A; Alabdulkareem M
    Sensors (Basel); 2020 Nov; 20(23):. PubMed ID: 33266009
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation.
    Nam J; Choo KK; Han S; Kim M; Paik J; Won D
    PLoS One; 2015; 10(4):e0116709. PubMed ID: 25849359
    [TBL] [Abstract][Full Text] [Related]  

  • 15. A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks.
    Chen H; Ge L; Xie L
    Sensors (Basel); 2015 Jul; 15(7):17057-75. PubMed ID: 26184224
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Approach to design neural cryptography: a generalized architecture and a heuristic rule.
    Mu N; Liao X; Huang T
    Phys Rev E Stat Nonlin Soft Matter Phys; 2013 Jun; 87(6):062804. PubMed ID: 23848726
    [TBL] [Abstract][Full Text] [Related]  

  • 17. FPGA Implementation for Elliptic Curve Cryptography Algorithm and Circuit with High Efficiency and Low Delay for IoT Applications.
    Wang D; Lin Y; Hu J; Zhang C; Zhong Q
    Micromachines (Basel); 2023 May; 14(5):. PubMed ID: 37241660
    [TBL] [Abstract][Full Text] [Related]  

  • 18. An efficient steganography method for hiding patient confidential information.
    Al-Dmour H; Al-Ani A; Nguyen H
    Annu Int Conf IEEE Eng Med Biol Soc; 2014; 2014():222-5. PubMed ID: 25569937
    [TBL] [Abstract][Full Text] [Related]  

  • 19. A novel image encryption scheme based on quantum dynamical spinning and rotations.
    Khan M; Waseem HM
    PLoS One; 2018; 13(11):e0206460. PubMed ID: 30452455
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Design and Implementation of High-Performance ECC Processor with Unified Point Addition on Twisted Edwards Curve.
    Islam MM; Hossain MS; Hasan MK; Shahjalal M; Jang YM
    Sensors (Basel); 2020 Sep; 20(18):. PubMed ID: 32927594
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 5.