These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

189 related articles for article (PubMed ID: 28733249)

  • 21. A fusion data security protection scheme for sensitive E-documents in the open network environment.
    Liu L; Cao M; Sun Y
    PLoS One; 2021; 16(12):e0258464. PubMed ID: 34910722
    [TBL] [Abstract][Full Text] [Related]  

  • 22. Obfuscatable multi-recipient re-encryption for secure privacy-preserving personal health record services.
    Shi Y; Fan H; Xiong G
    Technol Health Care; 2015; 23 Suppl 1():S139-45. PubMed ID: 26410316
    [TBL] [Abstract][Full Text] [Related]  

  • 23. Logistic regression over encrypted data from fully homomorphic encryption.
    Chen H; Gilad-Bachrach R; Han K; Huang Z; Jalali A; Laine K; Lauter K
    BMC Med Genomics; 2018 Oct; 11(Suppl 4):81. PubMed ID: 30309350
    [TBL] [Abstract][Full Text] [Related]  

  • 24. A Novel Cipher-Based Data Encryption with Galois Field Theory.
    Hazzazi MM; Attuluri S; Bassfar Z; Joshi K
    Sensors (Basel); 2023 Mar; 23(6):. PubMed ID: 36991997
    [TBL] [Abstract][Full Text] [Related]  

  • 25. An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System.
    Li CT; Wu TY; Chen CL; Lee CC; Chen CM
    Sensors (Basel); 2017 Jun; 17(7):. PubMed ID: 28644381
    [TBL] [Abstract][Full Text] [Related]  

  • 26. DNA-based cryptographic methods for data hiding in DNA media.
    Marwan S; Shawish A; Nagaty K
    Biosystems; 2016 Dec; 150():110-118. PubMed ID: 27634362
    [TBL] [Abstract][Full Text] [Related]  

  • 27. Fast parallel molecular algorithms for DNA-based computation: solving the elliptic curve discrete logarithm problem over GF2.
    Li K; Zou S; Xv J
    J Biomed Biotechnol; 2008; 2008():518093. PubMed ID: 18431451
    [TBL] [Abstract][Full Text] [Related]  

  • 28. A digital memories based user authentication scheme with privacy preservation.
    Liu J; Lyu Q; Wang Q; Yu X
    PLoS One; 2017; 12(11):e0186925. PubMed ID: 29190659
    [TBL] [Abstract][Full Text] [Related]  

  • 29. A secured cryptographic system based on DNA and a hybrid key generation approach.
    Indrasena Reddy M; Siva Kumar AP; Subba Reddy K
    Biosystems; 2020 Nov; 197():104207. PubMed ID: 32653339
    [TBL] [Abstract][Full Text] [Related]  

  • 30. Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms.
    Farooq S; Altaf A; Iqbal F; Thompson EB; Vargas DLR; Díez IT; Ashraf I
    Sensors (Basel); 2023 Jun; 23(12):. PubMed ID: 37420546
    [TBL] [Abstract][Full Text] [Related]  

  • 31. Efficiently Multi-User Searchable Encryption Scheme with Attribute Revocation and Grant for Cloud Storage.
    Wang S; Zhang X; Zhang Y
    PLoS One; 2016; 11(11):e0167157. PubMed ID: 27898703
    [TBL] [Abstract][Full Text] [Related]  

  • 32. Private queries on encrypted genomic data.
    Çetin GS; Chen H; Laine K; Lauter K; Rindal P; Xia Y
    BMC Med Genomics; 2017 Jul; 10(Suppl 2):45. PubMed ID: 28786359
    [TBL] [Abstract][Full Text] [Related]  

  • 33. Ensemble of Chaotic and Naive Approaches for Performance Enhancement in Video Encryption.
    Chandrasekaran J; Thiruvengadam SJ
    ScientificWorldJournal; 2015; 2015():458272. PubMed ID: 26550603
    [TBL] [Abstract][Full Text] [Related]  

  • 34. A partial encryption algorithm for medical images based on quick response code and reversible data hiding technology.
    Li J; Zhang Z; Li S; Benton R; Huang Y; Kasukurthi MV; Li D; Lin J; Borchert GM; Tan S; Li G; Ma B; Yang M; Huang J
    BMC Med Inform Decis Mak; 2020 Dec; 20(Suppl 14):297. PubMed ID: 33323108
    [TBL] [Abstract][Full Text] [Related]  

  • 35. New insights into the existing image encryption algorithms based on DNA coding.
    Xue X; Zhou D; Zhou C
    PLoS One; 2020; 15(10):e0241184. PubMed ID: 33095816
    [TBL] [Abstract][Full Text] [Related]  

  • 36. A Lightweight Encryption Scheme Combined with Trust Management for Privacy-Preserving in Body Sensor Networks.
    Guo P; Wang J; Ji S; Geng XH; Xiong NN
    J Med Syst; 2015 Dec; 39(12):190. PubMed ID: 26490148
    [TBL] [Abstract][Full Text] [Related]  

  • 37. Dual-Level Security based Cyclic18 Steganographic Method and its Application for Secure Transmission of Keyframes during Wireless Capsule Endoscopy.
    Muhammad K; Sajjad M; Baik SW
    J Med Syst; 2016 May; 40(5):114. PubMed ID: 26995355
    [TBL] [Abstract][Full Text] [Related]  

  • 38. Secure CT-Image Encryption for COVID-19 Infections Using HBBS-Based Multiple Key-Streams.
    Reyad O; Karar ME
    Arab J Sci Eng; 2021; 46(4):3581-3593. PubMed ID: 33425645
    [TBL] [Abstract][Full Text] [Related]  

  • 39. Symmetric-Key Encryption Based on Bioaffinity Interactions.
    McGoldrick LK; Weiss EA; Halámek J
    ACS Synth Biol; 2019 Jul; 8(7):1655-1662. PubMed ID: 31287664
    [TBL] [Abstract][Full Text] [Related]  

  • 40. An Efficient Searchable Encryption Against Keyword Guessing Attacks for Sharable Electronic Medical Records in Cloud-based System.
    Wu Y; Lu X; Su J; Chen P
    J Med Syst; 2016 Dec; 40(12):258. PubMed ID: 27722976
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 10.