These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

78 related articles for article (PubMed ID: 28036085)

  • 1. RFID Ownership Transfer with Positive Secrecy Capacity Channels.
    Munilla J; Burmester M; Peinado A; Yang G; Susilo W
    Sensors (Basel); 2016 Dec; 17(1):. PubMed ID: 28036085
    [TBL] [Abstract][Full Text] [Related]  

  • 2. An RFID-Based Smart Structure for the Supply Chain: Resilient Scanning Proofs and Ownership Transfer with Positive Secrecy Capacity Channels.
    Burmester M; Munilla J; Ortiz A; Caballero-Gil P
    Sensors (Basel); 2017 Jul; 17(7):. PubMed ID: 28677637
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Secrecy Capacity of a Class of Erasure Wiretap Channels in WBAN.
    Wang B; Deng J; Sun Y; Guo W; Feng G
    Sensors (Basel); 2018 Nov; 18(12):. PubMed ID: 30486250
    [TBL] [Abstract][Full Text] [Related]  

  • 4. A Secure Partial RFID Ownership Transfer Protocol with Multi-Owners.
    Luo JN; Yang MH
    Sensors (Basel); 2019 Dec; 20(1):. PubMed ID: 31861507
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Gaussian Multiuser Wiretap Channels in the Presence of a Jammer-Aided Eavesdropper.
    Chou RA; Yener A
    Entropy (Basel); 2022 Nov; 24(11):. PubMed ID: 36359685
    [TBL] [Abstract][Full Text] [Related]  

  • 6. An overview of generic tools for information-theoretic secrecy performance analysis over wiretap fading channels.
    Kong L; Ai Y; Lei L; Kaddoum G; Chatzinotas S; Ottersten B
    EURASIP J Wirel Commun Netw; 2021; 2021(1):194. PubMed ID: 34899875
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Physical-layer security analysis of a quantum-noise randomized cipher based on the wire-tap channel model.
    Jiao H; Pu T; Zheng J; Xiang P; Fang T
    Opt Express; 2017 May; 25(10):10947-10960. PubMed ID: 28788782
    [TBL] [Abstract][Full Text] [Related]  

  • 8. On the Zero-Outage Secrecy-Capacity of Dependent Fading Wiretap Channels.
    Jorswieck E; Lin PH; Besser KL
    Entropy (Basel); 2022 Jan; 24(1):. PubMed ID: 35052125
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Secure Polar Coding for the Primitive Relay Wiretap Channel.
    Athanasakos M; Karagiannidis G
    Entropy (Basel); 2021 Apr; 23(4):. PubMed ID: 33918817
    [TBL] [Abstract][Full Text] [Related]  

  • 10. A Provably Secure RFID Authentication Protocol Based on Elliptic Curve for Healthcare Environments.
    Farash MS; Nawaz O; Mahmood K; Chaudhry SA; Khan MK
    J Med Syst; 2016 Jul; 40(7):165. PubMed ID: 27221283
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Secrecy Capacity Region of the AWGN MAC with External Eavesdropper and Feedback.
    Yuan H; Xie G; Dai B
    Entropy (Basel); 2023 Sep; 25(9):. PubMed ID: 37761639
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Secure Transmission in mmWave Wiretap Channels: On Sector Guard Zone and Blockages.
    Song Y; Yang W; Xiang Z; Liu Y; Cai Y
    Entropy (Basel); 2019 Apr; 21(4):. PubMed ID: 33267141
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Feedback Schemes for the Action-Dependent Wiretap Channel with Noncausal State at the Transmitter.
    Zhang H; Yu L; Dai B
    Entropy (Basel); 2019 Mar; 21(3):. PubMed ID: 33266993
    [TBL] [Abstract][Full Text] [Related]  

  • 14. New Result on the Feedback Capacity of the Action-Dependent Dirty Paper Wiretap Channel.
    Xie G; Dai B
    Entropy (Basel); 2021 Jul; 23(8):. PubMed ID: 34441069
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Implications of Coding Layers on Physical-Layer Security: A Secrecy Benefit Approach.
    Harrison WK; Beard E; Dye S; Holmes E; Nelson K; Gomes MAC; Vilela JP
    Entropy (Basel); 2019 Aug; 21(8):. PubMed ID: 33267469
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Privacy enhancing techniques - the key to secure communication and management of clinical and genomic data.
    De Moor GJ; Claerhout B; De Meyer F
    Methods Inf Med; 2003; 42(2):148-53. PubMed ID: 12743651
    [TBL] [Abstract][Full Text] [Related]  

  • 17. LS Channel Estimation and Signal Separation for UHF RFID Tag Collision Recovery on the Physical Layer.
    Duan H; Wu H; Zeng Y; Chen Y
    Sensors (Basel); 2016 Mar; 16(4):442. PubMed ID: 27023560
    [TBL] [Abstract][Full Text] [Related]  

  • 18. A Secure RFID Tag Authentication Protocol with Privacy Preserving in Telecare Medicine Information System.
    Li CT; Weng CY; Lee CC
    J Med Syst; 2015 Aug; 39(8):77. PubMed ID: 26084587
    [TBL] [Abstract][Full Text] [Related]  

  • 19. A note on the security of IS-RFID, an inpatient medication safety.
    Safkhani M; Bagheri N; Naderi M
    Int J Med Inform; 2014 Jan; 83(1):82-5. PubMed ID: 23659961
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Amplitude Constrained Vector Gaussian Wiretap Channel: Properties of the Secrecy-Capacity-Achieving Input Distribution.
    Favano A; Barletta L; Dytso A
    Entropy (Basel); 2023 Apr; 25(5):. PubMed ID: 37238496
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 4.