These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

138 related articles for article (PubMed ID: 28028211)

  • 21. Comparative Study on Various Authentication Protocols in Wireless Sensor Networks.
    Rajeswari SR; Seenivasagam V
    ScientificWorldJournal; 2016; 2016():6854303. PubMed ID: 26881272
    [TBL] [Abstract][Full Text] [Related]  

  • 22. 1-RAAP: An Efficient 1-Round Anonymous Authentication Protocol for Wireless Body Area Networks.
    Liu J; Zhang L; Sun R
    Sensors (Basel); 2016 May; 16(5):. PubMed ID: 27213384
    [TBL] [Abstract][Full Text] [Related]  

  • 23. A New Privacy-Preserving Handover Authentication Scheme for Wireless Networks.
    Wang C; Yuan Y; Wu J
    Sensors (Basel); 2017 Jun; 17(6):. PubMed ID: 28632171
    [TBL] [Abstract][Full Text] [Related]  

  • 24. Security Issues for Mobile Medical Imaging: A Primer.
    Choudhri AF; Chatterjee AR; Javan R; Radvany MG; Shih G
    Radiographics; 2015 Oct; 35(6):1814-24. PubMed ID: 26466188
    [TBL] [Abstract][Full Text] [Related]  

  • 25. An Outline of Data Aggregation Security in Heterogeneous Wireless Sensor Networks.
    Boubiche S; Boubiche DE; Bilami A; Toral-Cruz H
    Sensors (Basel); 2016 Apr; 16(4):. PubMed ID: 27077866
    [TBL] [Abstract][Full Text] [Related]  

  • 26. Securing the communication of medical information using local biometric authentication and commercial wireless links.
    Ivanov VI; Yu PL; Baras JS
    Health Informatics J; 2010 Sep; 16(3):211-23. PubMed ID: 20889851
    [TBL] [Abstract][Full Text] [Related]  

  • 27. A Hybrid Secure Scheme for Wireless Sensor Networks against Timing Attacks Using Continuous-Time Markov Chain and Queueing Model.
    Meng T; Li X; Zhang S; Zhao Y
    Sensors (Basel); 2016 Sep; 16(10):. PubMed ID: 27690042
    [TBL] [Abstract][Full Text] [Related]  

  • 28. Enhanced Security Authentication Based on Convolutional-LSTM Networks.
    Qiu X; Sun X; Hayes M
    Sensors (Basel); 2021 Aug; 21(16):. PubMed ID: 34450819
    [TBL] [Abstract][Full Text] [Related]  

  • 29. Worst-Case Cooperative Jamming for Secure Communications in CIoT Networks.
    Li Z; Jing T; Ma L; Huo Y; Qian J
    Sensors (Basel); 2016 Mar; 16(3):. PubMed ID: 26959032
    [TBL] [Abstract][Full Text] [Related]  

  • 30. Wireless security in mobile health.
    Osunmuyiwa O; Ulusoy AH
    Telemed J E Health; 2012 Dec; 18(10):810-4. PubMed ID: 23234427
    [TBL] [Abstract][Full Text] [Related]  

  • 31. Security Belt for Wireless Implantable Medical Devices.
    KulaƧ S
    J Med Syst; 2017 Sep; 41(11):172. PubMed ID: 28929373
    [TBL] [Abstract][Full Text] [Related]  

  • 32. A Secure Transmission Scheme Based on Artificial Fading for Wireless CrowdSensing Networks.
    Xu ZJ; Chen FN; Wu Y; Gong Y
    Sensors (Basel); 2018 Oct; 18(10):. PubMed ID: 30336577
    [TBL] [Abstract][Full Text] [Related]  

  • 33. Dual-Level Security based Cyclic18 Steganographic Method and its Application for Secure Transmission of Keyframes during Wireless Capsule Endoscopy.
    Muhammad K; Sajjad M; Baik SW
    J Med Syst; 2016 May; 40(5):114. PubMed ID: 26995355
    [TBL] [Abstract][Full Text] [Related]  

  • 34. On the Physical Layer Security Characteristics for MIMO-SVD Techniques for SC-FDE Schemes.
    Madeira J; Guerreiro J; Dinis R; Montezuma P; Campos LM
    Sensors (Basel); 2019 Nov; 19(21):. PubMed ID: 31683931
    [TBL] [Abstract][Full Text] [Related]  

  • 35. Security and eavesdropping in terahertz wireless links.
    Ma J; Shrestha R; Adelberg J; Yeh CY; Hossain Z; Knightly E; Jornet JM; Mittleman DM
    Nature; 2018 Nov; 563(7729):89-93. PubMed ID: 30323288
    [TBL] [Abstract][Full Text] [Related]  

  • 36. Applications of Multi-Channel Safety Authentication Protocols in Wireless Networks.
    Chen YL; Liau RH; Chang LY
    J Med Syst; 2016 Jan; 40(1):26. PubMed ID: 26547846
    [TBL] [Abstract][Full Text] [Related]  

  • 37. Physical Layer Key Generation in 5G and Beyond Wireless Communications: Challenges and Opportunities.
    Li G; Sun C; Zhang J; Jorswieck E; Xiao B; Hu A
    Entropy (Basel); 2019 May; 21(5):. PubMed ID: 33267211
    [TBL] [Abstract][Full Text] [Related]  

  • 38. Physical Layer Secret-Key Generation Scheme for Transportation Security Sensor Network.
    Yang B; Zhang J
    Sensors (Basel); 2017 Jun; 17(7):. PubMed ID: 28657588
    [TBL] [Abstract][Full Text] [Related]  

  • 39. Enhanced Two-Factor Authentication and Key Agreement Using Dynamic Identities in Wireless Sensor Networks.
    Chang IP; Lee TF; Lin TH; Liu CM
    Sensors (Basel); 2015 Nov; 15(12):29841-54. PubMed ID: 26633396
    [TBL] [Abstract][Full Text] [Related]  

  • 40. Metasurface-Assisted Wireless Communication with Physical Level Information Encryption.
    Zheng Y; Chen K; Xu Z; Zhang N; Wang J; Zhao J; Feng Y
    Adv Sci (Weinh); 2022 Dec; 9(34):e2204558. PubMed ID: 36253150
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 7.