These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

102 related articles for article (PubMed ID: 27658349)

  • 21. Stochastic switching and analog-state programmable memristor and its utilization for homomorphic encryption hardware.
    Cheong WH; In JH; Jeon JB; Kim G; Kim KM
    Nat Commun; 2024 Jul; 15(1):6318. PubMed ID: 39060238
    [TBL] [Abstract][Full Text] [Related]  

  • 22. Reversible Data Hiding Algorithm in Fully Homomorphic Encrypted Domain.
    Li J; Liang X; Dai C; Xiang S
    Entropy (Basel); 2019 Jun; 21(7):. PubMed ID: 33267339
    [TBL] [Abstract][Full Text] [Related]  

  • 23. Quantum enigma machine: Experimentally demonstrating quantum data locking.
    Lum DJ; Howell JC; Allman MS; Gerrits T; Verma VB; Nam SW; Lupo C; Lloyd S
    Phys Rev A (Coll Park); 2016; 94():. PubMed ID: 31093584
    [TBL] [Abstract][Full Text] [Related]  

  • 24. Private naive bayes classification of personal biomedical data: Application in cancer data analysis.
    Wood A; Shpilrain V; Najarian K; Kahrobaei D
    Comput Biol Med; 2019 Feb; 105():144-150. PubMed ID: 30641309
    [TBL] [Abstract][Full Text] [Related]  

  • 25. Secure searching of biomarkers through hybrid homomorphic encryption scheme.
    Kim M; Song Y; Cheon JH
    BMC Med Genomics; 2017 Jul; 10(Suppl 2):42. PubMed ID: 28786366
    [TBL] [Abstract][Full Text] [Related]  

  • 26. Shifted LT Code Security Scheme for Partial Information Encryption.
    Zhang S; Niu F; Wang L; Yu L
    Entropy (Basel); 2022 Dec; 24(12):. PubMed ID: 36554181
    [TBL] [Abstract][Full Text] [Related]  

  • 27. Secure Logistic Regression Based on Homomorphic Encryption: Design and Evaluation.
    Kim M; Song Y; Wang S; Xia Y; Jiang X
    JMIR Med Inform; 2018 Apr; 6(2):e19. PubMed ID: 29666041
    [TBL] [Abstract][Full Text] [Related]  

  • 28. Quantum-Safe Group Key Establishment Protocol from Lattice Trapdoors.
    Gebremichael T; Gidlund M; Hancke GP; Jennehag U
    Sensors (Basel); 2022 May; 22(11):. PubMed ID: 35684771
    [TBL] [Abstract][Full Text] [Related]  

  • 29. Image encryption using polarized light encoding and amplitude and phase truncation in the Fresnel domain.
    Rajput SK; Nishchal NK
    Appl Opt; 2013 Jun; 52(18):4343-52. PubMed ID: 23842178
    [TBL] [Abstract][Full Text] [Related]  

  • 30. Attribute-based proxy re-encryption with keyword search.
    Shi Y; Liu J; Han Z; Zheng Q; Zhang R; Qiu S
    PLoS One; 2014; 9(12):e116325. PubMed ID: 25549257
    [TBL] [Abstract][Full Text] [Related]  

  • 31. Homomorphic-Encrypted Volume Rendering.
    Mazza S; Patel D; Viola I
    IEEE Trans Vis Comput Graph; 2021 Feb; 27(2):635-644. PubMed ID: 33048733
    [TBL] [Abstract][Full Text] [Related]  

  • 32. Privacy preserving probabilistic record linkage (P3RL): a novel method for linking existing health-related data and maintaining participant confidentiality.
    Schmidlin K; Clough-Gorr KM; Spoerri A;
    BMC Med Res Methodol; 2015 May; 15():46. PubMed ID: 26024886
    [TBL] [Abstract][Full Text] [Related]  

  • 33. New Constructions of Identity-Based Dual Receiver Encryption from Lattices.
    Liu Y; Wang L; Shen X; Li L
    Entropy (Basel); 2020 May; 22(6):. PubMed ID: 33286371
    [TBL] [Abstract][Full Text] [Related]  

  • 34. Secure medical information sharing in cloud computing.
    Shao Z; Yang B; Zhang W; Zhao Y; Wu Z; Miao M
    Technol Health Care; 2015; 23 Suppl 1():S133-7. PubMed ID: 26410315
    [TBL] [Abstract][Full Text] [Related]  

  • 35. Double-image encryption without information disclosure using phase-truncation Fourier transforms and a random amplitude mask.
    Wang X; Zhao D; Chen Y
    Appl Opt; 2014 Aug; 53(23):5100-8. PubMed ID: 25320917
    [TBL] [Abstract][Full Text] [Related]  

  • 36. [Encryption technique for linkable anonymizing].
    Okamoto E
    Nihon Koshu Eisei Zasshi; 2004 Jun; 51(6):445-51. PubMed ID: 15296025
    [TBL] [Abstract][Full Text] [Related]  

  • 37. Quantum signature scheme based on Hadamard and H
    Xin X; Wang Z; Yang Q
    Appl Opt; 2019 Sep; 58(27):7346-7351. PubMed ID: 31674378
    [TBL] [Abstract][Full Text] [Related]  

  • 38. Image feature extraction in encrypted domain with privacy-preserving SIFT.
    Hsu CY; Lu CS; Pei SC
    IEEE Trans Image Process; 2012 Nov; 21(11):4593-607. PubMed ID: 22711774
    [TBL] [Abstract][Full Text] [Related]  

  • 39. Lensless multiple-image optical encryption based on improved phase retrieval algorithm.
    Huang JJ; Hwang HE; Chen CY; Chen CM
    Appl Opt; 2012 May; 51(13):2388-94. PubMed ID: 22614416
    [TBL] [Abstract][Full Text] [Related]  

  • 40. An optical encryption and authentication scheme using asymmetric keys.
    Rajput SK; Nishchal NK
    J Opt Soc Am A Opt Image Sci Vis; 2014 Jun; 31(6):1233-8. PubMed ID: 24977361
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 6.