BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

374 related articles for article (PubMed ID: 28545151)

  • 1. Provenance based data integrity checking and verification in cloud environments.
    Imran M; Hlavacs H; Haq IU; Jan B; Khan FA; Ahmad A
    PLoS One; 2017; 12(5):e0177576. PubMed ID: 28545151
    [TBL] [Abstract][Full Text] [Related]  

  • 2. A keyword searchable attribute-based encryption scheme with attribute update for cloud storage.
    Wang S; Ye J; Zhang Y
    PLoS One; 2018; 13(5):e0197318. PubMed ID: 29795577
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Security and privacy preserving approaches in the eHealth clouds with disaster recovery plan.
    Sahi A; Lai D; Li Y
    Comput Biol Med; 2016 Nov; 78():1-8. PubMed ID: 27639895
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Verifiable fully outsourced attribute-based signcryption system for IoT eHealth big data in cloud computing.
    Kibiwott KP; Zhao YN; Kogo J; Zhang FL
    Math Biosci Eng; 2019 Apr; 16(5):3561-3594. PubMed ID: 31509915
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Multi-replicas integrity checking scheme with supporting probability audit for cloud-based IoT.
    Yuan Y; Yang F; Wang X; Tian Y; Li Z
    PeerJ Comput Sci; 2024; 10():e1790. PubMed ID: 38259890
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Searchable and revocable multi-data owner attribute-based encryption scheme with hidden policy in cloud storage.
    Wang S; Gao T; Zhang Y
    PLoS One; 2018; 13(11):e0206126. PubMed ID: 30383840
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Data Privacy in Cloud-assisted Healthcare Systems: State of the Art and Future Challenges.
    Sajid A; Abbas H
    J Med Syst; 2016 Jun; 40(6):155. PubMed ID: 27155893
    [TBL] [Abstract][Full Text] [Related]  

  • 8. eHealth Cloud Security Challenges: A Survey.
    Al-Issa Y; Ottom MA; Tamrawi A
    J Healthc Eng; 2019; 2019():7516035. PubMed ID: 31565209
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Secure two-party computation of solid triangle area and tetrahedral volume based on cloud platform.
    Zhang J; Li L; Tang Y; Luo S; Yang Y; Xin Y
    PLoS One; 2019; 14(6):e0217067. PubMed ID: 31194747
    [TBL] [Abstract][Full Text] [Related]  

  • 10. SM2-Based Offline/Online Efficient Data Integrity Verification Scheme for Multiple Application Scenarios.
    Li X; Yi Z; Li R; Wang XA; Li H; Yang X
    Sensors (Basel); 2023 Apr; 23(9):. PubMed ID: 37177511
    [TBL] [Abstract][Full Text] [Related]  

  • 11. An effective, secure and efficient tagging method for integrity protection of outsourced data in a public cloud storage.
    ALmarwani R; Zhang N; Garside J
    PLoS One; 2020; 15(11):e0241236. PubMed ID: 33151960
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Secure data storage based on blockchain and coding in edge computing.
    Ren YJ; Leng Y; Cheng YP; Wang J
    Math Biosci Eng; 2019 Mar; 16(4):1874-1892. PubMed ID: 31137190
    [TBL] [Abstract][Full Text] [Related]  

  • 13. The Rise of Cloud Computing: Data Protection, Privacy, and Open Research Challenges-A Systematic Literature Review (SLR).
    Hassan J; Shehzad D; Habib U; Aftab MU; Ahmad M; Kuleev R; Mazzara M
    Comput Intell Neurosci; 2022; 2022():8303504. PubMed ID: 35712069
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Security Architecture and Protocol for Trust Verifications Regarding the Integrity of Files Stored in Cloud Services.
    Pinheiro A; Dias Canedo E; de Sousa Junior RT; de Oliveira Albuquerque R; GarcĂ­a Villalba LJ; Kim TH
    Sensors (Basel); 2018 Mar; 18(3):. PubMed ID: 29498641
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Fine-grained Database Field Search Using Attribute-Based Encryption for E-Healthcare Clouds.
    Guo C; Zhuang R; Jie Y; Ren Y; Wu T; Choo KR
    J Med Syst; 2016 Nov; 40(11):235. PubMed ID: 27653042
    [TBL] [Abstract][Full Text] [Related]  

  • 16. A review on the state-of-the-art privacy-preserving approaches in the e-health clouds.
    Abbas A; Khan SU
    IEEE J Biomed Health Inform; 2014 Jul; 18(4):1431-41. PubMed ID: 25014943
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Computer Security Issues and Legal System Based on Cloud Computing.
    Li H
    Comput Intell Neurosci; 2022; 2022():8112212. PubMed ID: 35860647
    [TBL] [Abstract][Full Text] [Related]  

  • 18. A Study on CP-ABE-based Medical Data Sharing System with Key Abuse Prevention and Verifiable Outsourcing in the IoMT Environment.
    Hwang YW; Lee IY
    Sensors (Basel); 2020 Aug; 20(17):. PubMed ID: 32878202
    [TBL] [Abstract][Full Text] [Related]  

  • 19. A hybrid cloud read aligner based on MinHash and kmer voting that preserves privacy.
    Popic V; Batzoglou S
    Nat Commun; 2017 May; 8():15311. PubMed ID: 28508884
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Analysis of an ABE Scheme with Verifiable Outsourced Decryption.
    Liao Y; He Y; Li F; Jiang S; Zhou S
    Sensors (Basel); 2018 Jan; 18(1):. PubMed ID: 29320418
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 19.