These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

172 related articles for article (PubMed ID: 28629142)

  • 21. SGHRP: Secure Greedy Highway Routing Protocol with authentication and increased privacy in vehicular ad hoc networks.
    Khezri E; Zeinali E; Sargolzaey H
    PLoS One; 2023; 18(4):e0282031. PubMed ID: 37023137
    [TBL] [Abstract][Full Text] [Related]  

  • 22. Energy-Balanced Routing Algorithm Based on Ant Colony Optimization for Mobile Ad Hoc Networks.
    Yang D; Xia H; Xu E; Jing D; Zhang H
    Sensors (Basel); 2018 Oct; 18(11):. PubMed ID: 30373294
    [TBL] [Abstract][Full Text] [Related]  

  • 23. Energy consumption and control response evaluations of AODV routing in WSANs for building-temperature control.
    Booranawong A; Teerapabkajorndet W; Limsakul C
    Sensors (Basel); 2013 Jun; 13(7):8303-30. PubMed ID: 23807689
    [TBL] [Abstract][Full Text] [Related]  

  • 24. Secure and fair cluster head selection protocol for enhancing security in mobile ad hoc networks.
    Paramasivan B; Kaliappan M
    ScientificWorldJournal; 2014; 2014():608984. PubMed ID: 25143986
    [TBL] [Abstract][Full Text] [Related]  

  • 25. DT-RRNS: Routing Protocol Design for Secure and Reliable Distributed Smart Sensors Communication Systems.
    Gladkov A; Shiriaev E; Tchernykh A; Deryabin M; Babenko M; Nesmachnow S
    Sensors (Basel); 2023 Apr; 23(7):. PubMed ID: 37050798
    [TBL] [Abstract][Full Text] [Related]  

  • 26. A Practical Evaluation on RSA and ECC-Based Cipher Suites for IoT High-Security Energy-Efficient Fog and Mist Computing Devices.
    Suárez-Albela M; Fraga-Lamas P; Fernández-Caramés TM
    Sensors (Basel); 2018 Nov; 18(11):. PubMed ID: 30423831
    [TBL] [Abstract][Full Text] [Related]  

  • 27. Mitigate Wormhole Attack and Blackhole Attack Using Elliptic Curve Cryptography in MANET.
    Shukla M; Joshi BK; Singh U
    Wirel Pers Commun; 2021; 121(1):503-526. PubMed ID: 34219973
    [TBL] [Abstract][Full Text] [Related]  

  • 28. A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation.
    Rahayu TM; Lee SG; Lee HJ
    Sensors (Basel); 2015 Jun; 15(7):15127-58. PubMed ID: 26131669
    [TBL] [Abstract][Full Text] [Related]  

  • 29. Multi-hop routing mechanism for reliable sensor computing.
    Chen JL; Ma YW; Lai CP; Hu CC; Huang YM
    Sensors (Basel); 2009; 9(12):10117-35. PubMed ID: 22303165
    [TBL] [Abstract][Full Text] [Related]  

  • 30. Adaptive MANET multipath routing algorithm based on the simulated annealing approach.
    Kim S
    ScientificWorldJournal; 2014; 2014():872526. PubMed ID: 25032241
    [TBL] [Abstract][Full Text] [Related]  

  • 31. A Practical Evaluation of a High-Security Energy-Efficient Gateway for IoT Fog Computing Applications.
    Suárez-Albela M; Fernández-Caramés TM; Fraga-Lamas P; Castedo L
    Sensors (Basel); 2017 Aug; 17(9):. PubMed ID: 28850104
    [TBL] [Abstract][Full Text] [Related]  

  • 32. Modeling and Simulation of a Novel Relay Node Based Secure Routing Protocol Using Multiple Mobile Sink for Wireless Sensor Networks.
    Perumal M; Dhandapani S
    ScientificWorldJournal; 2015; 2015():495945. PubMed ID: 26495426
    [TBL] [Abstract][Full Text] [Related]  

  • 33. Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation.
    Xu Q; Tan C; Fan Z; Zhu W; Xiao Y; Cheng F
    Sensors (Basel); 2018 May; 18(5):. PubMed ID: 29772840
    [TBL] [Abstract][Full Text] [Related]  

  • 34. TrustWalker: An Efficient Trust Assessment in Vehicular Internet of Things (VIoT) with Security Consideration.
    Sohail M; Ali R; Kashif M; Ali S; Mehta S; Zikria YB; Yu H
    Sensors (Basel); 2020 Jul; 20(14):. PubMed ID: 32708534
    [TBL] [Abstract][Full Text] [Related]  

  • 35. An Enhanced Secure Identity-Based Certificateless Public Key Authentication Scheme for Vehicular Sensor Networks.
    Li C; Zhang X; Wang H; Li D
    Sensors (Basel); 2018 Jan; 18(1):. PubMed ID: 29324719
    [TBL] [Abstract][Full Text] [Related]  

  • 36. A New MANET wormhole detection algorithm based on traversal time and hop count analysis.
    Karlsson J; Dooley LS; Pulkkis G
    Sensors (Basel); 2011; 11(12):11122-40. PubMed ID: 22247657
    [TBL] [Abstract][Full Text] [Related]  

  • 37. A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing.
    Fan K; Wang J; Wang X; Li H; Yang Y
    Sensors (Basel); 2017 Jul; 17(7):. PubMed ID: 28737733
    [TBL] [Abstract][Full Text] [Related]  

  • 38. Address allocation for MANET merge and partition using cluster based routing.
    Singh S; Rajpal N; Sharma A
    Springerplus; 2014; 3():605. PubMed ID: 26034675
    [TBL] [Abstract][Full Text] [Related]  

  • 39. Receiver-Based Ad Hoc On Demand Multipath Routing Protocol for Mobile Ad Hoc Networks.
    Al-Nahari A; Mohamad MM
    PLoS One; 2016; 11(6):e0156670. PubMed ID: 27258013
    [TBL] [Abstract][Full Text] [Related]  

  • 40. Adaptive Risk Prediction and Anonymous Secured Communication in MANET for Medical Informatics.
    Ambidi N; Katta RLR
    J Med Syst; 2019 Mar; 43(5):115. PubMed ID: 30905047
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 9.