These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

138 related articles for article (PubMed ID: 28028211)

  • 1. Wireless physical layer security.
    Poor HV; Schaefer RF
    Proc Natl Acad Sci U S A; 2017 Jan; 114(1):19-26. PubMed ID: 28028211
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Physical Layer Authentication in Wireless Networks-Based Machine Learning Approaches.
    Alhoraibi L; Alghazzawi D; Alhebshi R; Rabie OBJ
    Sensors (Basel); 2023 Feb; 23(4):. PubMed ID: 36850412
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Butterfly Encryption Scheme for Resource-Constrained Wireless Networks.
    Sampangi RV; Sampalli S
    Sensors (Basel); 2015 Sep; 15(9):23145-67. PubMed ID: 26389899
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Three-Factor User Authentication and Key Agreement Using Elliptic Curve Cryptosystem in Wireless Sensor Networks.
    Park Y; Park Y
    Sensors (Basel); 2016 Dec; 16(12):. PubMed ID: 27983616
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Unconditional Authentication Based on Physical Layer Offered Chain Key in Wireless Communication.
    Wang S; Huang K; Xu X; Hu X; Yang J; Jin L
    Entropy (Basel); 2022 Mar; 24(4):. PubMed ID: 35455151
    [TBL] [Abstract][Full Text] [Related]  

  • 6. An Overview of Key Technologies in Physical Layer Security.
    Sanenga A; Mapunda GA; Jacob TML; Marata L; Basutli B; Chuma JM
    Entropy (Basel); 2020 Nov; 22(11):. PubMed ID: 33287029
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Securing While Sampling in Wireless Body Area Networks With Application to Electrocardiography.
    Dautov R; Tsouri GR
    IEEE J Biomed Health Inform; 2016 Jan; 20(1):135-42. PubMed ID: 25373134
    [TBL] [Abstract][Full Text] [Related]  

  • 8. A Novel Physical Layer Assisted Authentication Scheme for Mobile Wireless Sensor Networks.
    Wang Q
    Sensors (Basel); 2017 Feb; 17(2):. PubMed ID: 28165423
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Secure anonymous mutual authentication for star two-tier wireless body area networks.
    Ibrahim MH; Kumari S; Das AK; Wazid M; Odelu V
    Comput Methods Programs Biomed; 2016 Oct; 135():37-50. PubMed ID: 27586478
    [TBL] [Abstract][Full Text] [Related]  

  • 10. A Mutual Authentication Framework for Wireless Medical Sensor Networks.
    Srinivas J; Mishra D; Mukhopadhyay S
    J Med Syst; 2017 May; 41(5):80. PubMed ID: 28364358
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Secure Data Aggregation with Fully Homomorphic Encryption in Large-Scale Wireless Sensor Networks.
    Li X; Chen D; Li C; Wang L
    Sensors (Basel); 2015 Jul; 15(7):15952-73. PubMed ID: 26151208
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Patterns-of-Life Aided Authentication.
    Zhao N; Ren A; Zhang Z; Zhu T; Rehman MU; Yang X; Hu F
    Sensors (Basel); 2016 Sep; 16(10):. PubMed ID: 27669258
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Anti-Wiretap Spectrum-Sharing for Cooperative Cognitive Radio Communication Systems.
    Si P; Lu W; Gu K; Liu X; Li B; Peng H; Gong Y
    Sensors (Basel); 2019 Sep; 19(19):. PubMed ID: 31554300
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Practice brief. Securing wireless technology for healthcare.
    Retterer J; Casto BW;
    J AHIMA; 2004 May; 75(5):56A-56D. PubMed ID: 15141589
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Computation and Communication Evaluation of an Authentication Mechanism for Time-Triggered Networked Control Systems.
    Martins G; Moondra A; Dubey A; Bhattacharjee A; Koutsoukos XD
    Sensors (Basel); 2016 Jul; 16(8):. PubMed ID: 27463718
    [TBL] [Abstract][Full Text] [Related]  

  • 16. A Review of Fundamental Optimization Approaches and the Role of AI Enabling Technologies in Physical Layer Security.
    Tefera MK; Jin Z; Zhang S
    Sensors (Basel); 2022 May; 22(9):. PubMed ID: 35591279
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Game-theoretic approach for improving cooperation in wireless multihop networks.
    Ng SK; Seah WK
    IEEE Trans Syst Man Cybern B Cybern; 2010 Jun; 40(3):559-74. PubMed ID: 20211801
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Secure and Authenticated Data Communication in Wireless Sensor Networks.
    Alfandi O; Bochem A; Kellner A; Göge C; Hogrefe D
    Sensors (Basel); 2015 Aug; 15(8):19560-82. PubMed ID: 26266413
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Physical layer security in light-fidelity systems.
    Zhang Z; Chaaban A; Lampe L
    Philos Trans A Math Phys Eng Sci; 2020 Apr; 378(2169):20190193. PubMed ID: 32114918
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Improving Biometric-Based Authentication Schemes with Smart Card Revocation/Reissue for Wireless Sensor Networks.
    Moon J; Lee D; Lee Y; Won D
    Sensors (Basel); 2017 Apr; 17(5):. PubMed ID: 28441331
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 7.