These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

231 related articles for article (PubMed ID: 27792784)

  • 1. Novel Threshold Changeable Secret Sharing Schemes Based on Polynomial Interpolation.
    Yuan L; Li M; Guo C; Choo KR; Ren Y
    PLoS One; 2016; 11(10):e0165512. PubMed ID: 27792784
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Image inpainting-based behavior image secret sharing.
    Yan XH; Zhou X; Lu YL; Liu JJ; Yang GZ
    Math Biosci Eng; 2020 Mar; 17(4):2950-2966. PubMed ID: 32987509
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Hybrid threshold adaptable quantum secret sharing scheme with reverse Huffman-Fibonacci-tree coding.
    Lai H; Zhang J; Luo MX; Pan L; Pieprzyk J; Xiao F; Orgun MA
    Sci Rep; 2016 Aug; 6():31350. PubMed ID: 27515908
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Nonlinear secret image sharing scheme.
    Shin SH; Lee GJ; Yoo KY
    ScientificWorldJournal; 2014; 2014():418090. PubMed ID: 25140334
    [TBL] [Abstract][Full Text] [Related]  

  • 5. A Secure and Efficient Scalable Secret Image Sharing Scheme with Flexible Shadow Sizes.
    Xie D; Li L; Peng H; Yang Y
    PLoS One; 2017; 12(1):e0168674. PubMed ID: 28072851
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Centralized Threshold Key Generation Protocol Based on Shamir Secret Sharing and HMAC Authentication.
    Abdel Hakeem SA; Kim H
    Sensors (Basel); 2022 Jan; 22(1):. PubMed ID: 35009873
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Meaningful Secret Image Sharing with Saliency Detection.
    Cheng J; Yan X; Liu L; Jiang Y; Wang X
    Entropy (Basel); 2022 Feb; 24(3):. PubMed ID: 35327851
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Robust secret image sharing scheme resistance to maliciously tampered shadows by AMBTC and quantization.
    Sun Y; Yang CN; Yan X; Lu Y; Sun L
    Gene Expr Patterns; 2022 Sep; 45():119267. PubMed ID: 35940552
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Fake and dishonest participant location scheme in secret image sharing.
    Liu J; Sun L; Liu J; Yan X
    Math Biosci Eng; 2021 Mar; 18(3):2473-2495. PubMed ID: 33892556
    [TBL] [Abstract][Full Text] [Related]  

  • 10. (t, n) Threshold d-Level Quantum Secret Sharing.
    Song XL; Liu YB; Deng HY; Xiao YG
    Sci Rep; 2017 Jul; 7(1):6366. PubMed ID: 28743880
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Algebraic secret sharing using privacy homomorphisms for IoT-based healthcare systems.
    Chang CC; Li CT
    Math Biosci Eng; 2019 Apr; 16(5):3367-3381. PubMed ID: 31499618
    [TBL] [Abstract][Full Text] [Related]  

  • 12. A Maze Matrix-Based Secret Image Sharing Scheme with Cheater Detection.
    Chang CC; Horng JH; Shih CS; Chang CC
    Sensors (Basel); 2020 Jul; 20(13):. PubMed ID: 32646024
    [TBL] [Abstract][Full Text] [Related]  

  • 13. A collaborative secret sharing scheme based on the Chinese Remainder Theorem.
    Jia XX; Song YX; Wang DS; Nie DX; Wu JZ
    Math Biosci Eng; 2019 Feb; 16(3):1280-1299. PubMed ID: 30947420
    [TBL] [Abstract][Full Text] [Related]  

  • 14. A Kind of (
    Meng D; Li Z; Luo S; Han Z
    Entropy (Basel); 2023 May; 25(5):. PubMed ID: 37238582
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Adaptive visual cryptography scheme design based on QR codes.
    Zhang LN; Cui CY; Zhang XY; Wu W
    Math Biosci Eng; 2022 Aug; 19(12):12160-12179. PubMed ID: 36653991
    [TBL] [Abstract][Full Text] [Related]  

  • 16. An Efficient Quantum Secret Sharing Scheme Based on Restricted Threshold Access Structure.
    Li L; Li Z
    Entropy (Basel); 2023 Jan; 25(2):. PubMed ID: 36832630
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Standard (3, 5)-threshold quantum secret sharing by maximally entangled 6-qubit states.
    Long Y; Zhang C; Sun Z
    Sci Rep; 2021 Nov; 11(1):22649. PubMed ID: 34811381
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Security of a kind of quantum secret sharing with entangled states.
    Wang TY; Liu YZ; Wei CY; Cai XQ; Ma JF
    Sci Rep; 2017 May; 7(1):2485. PubMed ID: 28559570
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Verifiable threshold signature schemes against conspiracy attack.
    Gan YJ
    J Zhejiang Univ Sci; 2004 Jan; 5(1):50-4. PubMed ID: 14663852
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Ramp secret image sharing.
    Yan XH; Li LL; Liu LT; Lu YL; Song XH
    Math Biosci Eng; 2019 May; 16(5):4433-4455. PubMed ID: 31499670
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 12.