These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

230 related articles for article (PubMed ID: 27792784)

  • 21. Verifiable threshold signature schemes against conspiracy attack.
    Gan YJ
    J Zhejiang Univ Sci; 2004 Jan; 5(1):50-4. PubMed ID: 14663852
    [TBL] [Abstract][Full Text] [Related]  

  • 22. Ramp secret image sharing.
    Yan XH; Li LL; Liu LT; Lu YL; Song XH
    Math Biosci Eng; 2019 May; 16(5):4433-4455. PubMed ID: 31499670
    [TBL] [Abstract][Full Text] [Related]  

  • 23. AMBTC-based visual secret sharing with different meaningful shadows.
    Wang S; Lu Y; Yan X; Li L; Yu Y
    Math Biosci Eng; 2021 Jun; 18(5):5236-5251. PubMed ID: 34517486
    [TBL] [Abstract][Full Text] [Related]  

  • 24. A Novel General (
    Xing F; Yan X; Yu L; Li L
    Entropy (Basel); 2022 Feb; 24(3):. PubMed ID: 35327829
    [TBL] [Abstract][Full Text] [Related]  

  • 25. Verifiable, Secure Mobile Agent Migration in Healthcare Systems Using a Polynomial-Based Threshold Secret Sharing Scheme with a Blowfish Algorithm.
    Kumar P; Banerjee K; Singhal N; Kumar A; Rani S; Kumar R; Lavinia CA
    Sensors (Basel); 2022 Nov; 22(22):. PubMed ID: 36433217
    [TBL] [Abstract][Full Text] [Related]  

  • 26. Unbreakable distributed storage with quantum key distribution network and password-authenticated secret sharing.
    Fujiwara M; Waseda A; Nojima R; Moriai S; Ogata W; Sasaki M
    Sci Rep; 2016 Jul; 6():28988. PubMed ID: 27363566
    [TBL] [Abstract][Full Text] [Related]  

  • 27. Combination of Sharing Matrix and Image Encryption for Lossless $(k,n)$ -Secret Image Sharing.
    Bao L; Yi S; Zhou Y
    IEEE Trans Image Process; 2017 Dec; 26(12):5618-5631. PubMed ID: 28809684
    [TBL] [Abstract][Full Text] [Related]  

  • 28. A global progressive image secret sharing scheme under multi-group joint management.
    Zhang L; Zhang J; Sun J; Chen Q
    Math Biosci Eng; 2024 Jan; 21(1):1286-1304. PubMed ID: 38303465
    [TBL] [Abstract][Full Text] [Related]  

  • 29. GAN-Based Key Secret-Sharing Scheme in Blockchain.
    Zheng W; Wang K; Wang FY
    IEEE Trans Cybern; 2021 Jan; 51(1):393-404. PubMed ID: 31985449
    [TBL] [Abstract][Full Text] [Related]  

  • 30. Improving security of efficient multiparty quantum secret sharing based on a novel structure and single qubits.
    Cai XQ; Li S; Liu ZF; Wang TY
    Sci Rep; 2024 Aug; 14(1):18385. PubMed ID: 39117918
    [TBL] [Abstract][Full Text] [Related]  

  • 31. A structure-preserving linearly homomorphic signature scheme with designated combiner.
    Zhou X; Tian Y; Zhong W; Zhou T; Yang X
    PeerJ Comput Sci; 2024; 10():e1978. PubMed ID: 38660204
    [TBL] [Abstract][Full Text] [Related]  

  • 32. Tree parity machine guided patients' privileged based secure sharing of electronic medical record: cybersecurity for telehealth during COVID-19.
    Sarkar A; Sarkar M
    Multimed Tools Appl; 2021; 80(14):21899-21923. PubMed ID: 33776546
    [TBL] [Abstract][Full Text] [Related]  

  • 33. Simulating cloud environment for HIS backup using secret sharing.
    Kuroda T; Kimura E; Matsumura Y; Yamashita Y; Hiramatsu H; Kume N
    Stud Health Technol Inform; 2013; 192():171-4. PubMed ID: 23920538
    [TBL] [Abstract][Full Text] [Related]  

  • 34. Threshold secret sharing scheme based on phase-shifting interferometry.
    Deng X; Shi Z; Wen W
    Appl Opt; 2016 Nov; 55(31):8855-8859. PubMed ID: 27828285
    [TBL] [Abstract][Full Text] [Related]  

  • 35. Improved one-way hash chain and revocation polynomial-based self-healing group key distribution schemes in resource-constrained wireless networks.
    Chen H; Xie L
    Sensors (Basel); 2014 Dec; 14(12):24358-80. PubMed ID: 25529204
    [TBL] [Abstract][Full Text] [Related]  

  • 36. Multiparty weighted threshold quantum secret sharing based on the Chinese remainder theorem to share quantum information.
    Chou YH; Zeng GJ; Chen XY; Kuo SY
    Sci Rep; 2021 Mar; 11(1):6093. PubMed ID: 33731781
    [TBL] [Abstract][Full Text] [Related]  

  • 37. Quantum Secret Sharing Among Four Players Using Multipartite Bound Entanglement of an Optical Field.
    Zhou Y; Yu J; Yan Z; Jia X; Zhang J; Xie C; Peng K
    Phys Rev Lett; 2018 Oct; 121(15):150502. PubMed ID: 30362796
    [TBL] [Abstract][Full Text] [Related]  

  • 38. Hybrid Quantum Protocols for Secure Multiparty Summation and Multiplication.
    Sutradhar K; Om H
    Sci Rep; 2020 Jun; 10(1):9097. PubMed ID: 32499534
    [TBL] [Abstract][Full Text] [Related]  

  • 39. Reversible extended secret image sharing with ability to correct errors based on Chinese remainder theorem.
    Wang C; Peng Y; Liang Z; Wang Y; Ke G; Jin Z
    Heliyon; 2023 Apr; 9(4):e14918. PubMed ID: 37095991
    [TBL] [Abstract][Full Text] [Related]  

  • 40. Quantum secret sharing via local operations and classical communication.
    Yang YH; Gao F; Wu X; Qin SJ; Zuo HJ; Wen QY
    Sci Rep; 2015 Nov; 5():16967. PubMed ID: 26586412
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 12.