BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

209 related articles for article (PubMed ID: 29204890)

  • 1. DNA Cryptography and Deep Learning using Genetic Algorithm with NW algorithm for Key Generation.
    Kalsi S; Kaur H; Chang V
    J Med Syst; 2017 Dec; 42(1):17. PubMed ID: 29204890
    [TBL] [Abstract][Full Text] [Related]  

  • 2. A secured cryptographic system based on DNA and a hybrid key generation approach.
    Indrasena Reddy M; Siva Kumar AP; Subba Reddy K
    Biosystems; 2020 Nov; 197():104207. PubMed ID: 32653339
    [TBL] [Abstract][Full Text] [Related]  

  • 3. BRISK: Dynamic Encryption Based Cipher for Long Term Security.
    Dwivedi AD
    Sensors (Basel); 2021 Aug; 21(17):. PubMed ID: 34502635
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Cryptography with DNA binary strands.
    Leier A; Richter C; Banzhaf W; Rauhe H
    Biosystems; 2000 Jun; 57(1):13-22. PubMed ID: 10963862
    [TBL] [Abstract][Full Text] [Related]  

  • 5. One-time-pad cryptography scheme based on a three-dimensional DNA self-assembly pyramid structure.
    Peng W; Cheng D; Song C
    PLoS One; 2018; 13(11):e0206612. PubMed ID: 30399178
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Optimization of a Deep Learning Algorithm for Security Protection of Big Data from Video Images.
    Geng Q; Yan H; Lu X
    Comput Intell Neurosci; 2022; 2022():3394475. PubMed ID: 35300398
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Analytical Study of Hybrid Techniques for Image Encryption and Decryption.
    Chowdhary CL; Patel PV; Kathrotia KJ; Attique M; P K; Ijaz MF
    Sensors (Basel); 2020 Sep; 20(18):. PubMed ID: 32927714
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms.
    Farooq S; Altaf A; Iqbal F; Thompson EB; Vargas DLR; Díez IT; Ashraf I
    Sensors (Basel); 2023 Jun; 23(12):. PubMed ID: 37420546
    [TBL] [Abstract][Full Text] [Related]  

  • 9. A Novel Cipher-Based Data Encryption with Galois Field Theory.
    Hazzazi MM; Attuluri S; Bassfar Z; Joshi K
    Sensors (Basel); 2023 Mar; 23(6):. PubMed ID: 36991997
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Using Identity-Based Cryptography as a Foundation for an Effective and Secure Cloud Model for E-Health.
    Mittal S; Bansal A; Gupta D; Juneja S; Turabieh H; Elarabawy MM; Sharma A; Bitsue ZK
    Comput Intell Neurosci; 2022; 2022():7016554. PubMed ID: 35510050
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Machine learning cryptography methods for IoT in healthcare.
    Chinbat T; Madanian S; Airehrour D; Hassandoust F
    BMC Med Inform Decis Mak; 2024 Jun; 24(1):153. PubMed ID: 38831390
    [TBL] [Abstract][Full Text] [Related]  

  • 12. DNA based random key generation and management for OTP encryption.
    Zhang Y; Liu X; Sun M
    Biosystems; 2017 Sep; 159():51-63. PubMed ID: 28733249
    [TBL] [Abstract][Full Text] [Related]  

  • 13. One-time-pad cipher algorithm based on confusion mapping and DNA storage technology.
    Peng W; Cui S; Song C
    PLoS One; 2021; 16(1):e0245506. PubMed ID: 33471849
    [TBL] [Abstract][Full Text] [Related]  

  • 14. DNA-based cryptographic methods for data hiding in DNA media.
    Marwan S; Shawish A; Nagaty K
    Biosystems; 2016 Dec; 150():110-118. PubMed ID: 27634362
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Best Fit DNA-Based Cryptographic Keys: The Genetic Algorithm Approach.
    Mukherjee P; Garg H; Pradhan C; Ghosh S; Chowdhury S; Srivastava G
    Sensors (Basel); 2022 Sep; 22(19):. PubMed ID: 36236428
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Leveled Design of Cryptography Algorithms Using Cybernetic Methods for Using in Telemedicine Applications.
    Norouzzadeh Gil Molk AM; Aref MR; Ramazani Khorshiddoust R
    Comput Intell Neurosci; 2021; 2021():3583275. PubMed ID: 34545280
    [TBL] [Abstract][Full Text] [Related]  

  • 17. An Approach to Cryptography Based on Continuous-Variable Quantum Neural Network.
    Shi J; Chen S; Lu Y; Feng Y; Shi R; Yang Y; Li J
    Sci Rep; 2020 Feb; 10(1):2107. PubMed ID: 32034194
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Optical scanning cryptography for secure wireless transmission.
    Poon TC; Kim T; Doh K
    Appl Opt; 2003 Nov; 42(32):6496-503. PubMed ID: 14650492
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Symmetric-Key Encryption Based on Bioaffinity Interactions.
    McGoldrick LK; Weiss EA; Halámek J
    ACS Synth Biol; 2019 Jul; 8(7):1655-1662. PubMed ID: 31287664
    [TBL] [Abstract][Full Text] [Related]  

  • 20. AES Based White Box Cryptography in Digital Signature Verification.
    Shukla PK; Aljaedi A; Pareek PK; Alharbi AR; Jamal SS
    Sensors (Basel); 2022 Dec; 22(23):. PubMed ID: 36502144
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 11.