These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

476 related articles for article (PubMed ID: 28629131)

  • 1. A Hybrid Scheme for Fine-Grained Search and Access Authorization in Fog Computing Environment.
    Xiao M; Zhou J; Liu X; Jiang M
    Sensors (Basel); 2017 Jun; 17(6):. PubMed ID: 28629131
    [TBL] [Abstract][Full Text] [Related]  

  • 2. A searchable personal health records framework with fine-grained access control in cloud-fog computing.
    Sun J; Wang X; Wang S; Ren L
    PLoS One; 2018; 13(11):e0207543. PubMed ID: 30496194
    [TBL] [Abstract][Full Text] [Related]  

  • 3. A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing.
    Fan K; Wang J; Wang X; Li H; Yang Y
    Sensors (Basel); 2017 Jul; 17(7):. PubMed ID: 28737733
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Traceable ciphertext-policy attribute-based encryption scheme with attribute level user revocation for cloud storage.
    Wang S; Guo K; Zhang Y
    PLoS One; 2018; 13(9):e0203225. PubMed ID: 30212473
    [TBL] [Abstract][Full Text] [Related]  

  • 5. A keyword searchable attribute-based encryption scheme with attribute update for cloud storage.
    Wang S; Ye J; Zhang Y
    PLoS One; 2018; 13(5):e0197318. PubMed ID: 29795577
    [TBL] [Abstract][Full Text] [Related]  

  • 6. A Secure and Lightweight Fine-Grained Data Sharing Scheme for Mobile Cloud Computing.
    Li H; Lan C; Fu X; Wang C; Li F; Guo H
    Sensors (Basel); 2020 Aug; 20(17):. PubMed ID: 32825602
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation.
    Xu Q; Tan C; Fan Z; Zhu W; Xiao Y; Cheng F
    Sensors (Basel); 2018 May; 18(5):. PubMed ID: 29772840
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Backward Compatible Identity-Based Encryption.
    Kim J
    Sensors (Basel); 2023 Apr; 23(9):. PubMed ID: 37177384
    [TBL] [Abstract][Full Text] [Related]  

  • 9. A Ring Learning with Errors-Based Ciphertext-Policy Attribute-Based Proxy Re-Encryption Scheme for Secure Big Data Sharing in Cloud Environment.
    Li J; Peng J; Qiao Z
    Big Data; 2024 Oct; 12(5):357-366. PubMed ID: 35417273
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Efficient and accountable anti-leakage attribute-based encryption scheme for cloud storage.
    Yan L; Wang G; Feng H; Liu P; Gao H; Zhang W; Hu H; Pan F
    Heliyon; 2024 Jun; 10(12):e32404. PubMed ID: 38975165
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Multi-sensor network tracking research utilizing searchable encryption algorithm in the cloud computing environment.
    Sun X; Li S
    PeerJ Comput Sci; 2023; 9():e1433. PubMed ID: 37409083
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Online/Offline MA-CP-ABE with Cryptographic Reverse Firewalls for IoT.
    Li J; Fan Y; Bian X; Yuan Q
    Entropy (Basel); 2023 Apr; 25(4):. PubMed ID: 37190404
    [TBL] [Abstract][Full Text] [Related]  

  • 13. A revocable storage CP-ABE scheme with constant ciphertext length in cloud storage.
    Zhao Y; Xie X; Zhang X; Ding Y
    Math Biosci Eng; 2019 May; 16(5):4229-4249. PubMed ID: 31499660
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Efficiently Multi-User Searchable Encryption Scheme with Attribute Revocation and Grant for Cloud Storage.
    Wang S; Zhang X; Zhang Y
    PLoS One; 2016; 11(11):e0167157. PubMed ID: 27898703
    [TBL] [Abstract][Full Text] [Related]  

  • 15. A Secured Proxy-Based Data Sharing Module in IoT Environments Using Blockchain.
    Obour Agyekum KO; Xia Q; Sifah EB; Gao J; Xia H; Du X; Guizani M
    Sensors (Basel); 2019 Mar; 19(5):. PubMed ID: 30862110
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Attribute-based encryption scheme with multi-keyword search and supporting attribute revocation in cloud storage.
    Wang S; Yao L; Zhang Y
    PLoS One; 2018; 13(10):e0205675. PubMed ID: 30312345
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Identity-Based Proxy Re-Encryption Scheme Using Fog Computing and Anonymous Key Generation.
    Lin HY; Tsai TT; Ting PY; Fan YR
    Sensors (Basel); 2023 Mar; 23(5):. PubMed ID: 36904909
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Analysis of an ABE Scheme with Verifiable Outsourced Decryption.
    Liao Y; He Y; Li F; Jiang S; Zhou S
    Sensors (Basel); 2018 Jan; 18(1):. PubMed ID: 29320418
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Revocable and Fog-Enabled Proxy Re-Encryption Scheme for IoT Environments.
    Lin HY; Chen PR
    Sensors (Basel); 2024 Sep; 24(19):. PubMed ID: 39409330
    [TBL] [Abstract][Full Text] [Related]  

  • 20. An Improved ID-Based Data Storage Scheme for Fog-Enabled IoT Environments.
    Lin HY; Tsai TT; Ting PY; Chen CC
    Sensors (Basel); 2022 Jun; 22(11):. PubMed ID: 35684844
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 24.