These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

360 related articles for article (PubMed ID: 29772840)

  • 1. Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation.
    Xu Q; Tan C; Fan Z; Zhu W; Xiao Y; Cheng F
    Sensors (Basel); 2018 May; 18(5):. PubMed ID: 29772840
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Verifiable fully outsourced attribute-based signcryption system for IoT eHealth big data in cloud computing.
    Kibiwott KP; Zhao YN; Kogo J; Zhang FL
    Math Biosci Eng; 2019 Apr; 16(5):3561-3594. PubMed ID: 31509915
    [TBL] [Abstract][Full Text] [Related]  

  • 3. A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing.
    Fan K; Wang J; Wang X; Li H; Yang Y
    Sensors (Basel); 2017 Jul; 17(7):. PubMed ID: 28737733
    [TBL] [Abstract][Full Text] [Related]  

  • 4. A Hybrid Scheme for Fine-Grained Search and Access Authorization in Fog Computing Environment.
    Xiao M; Zhou J; Liu X; Jiang M
    Sensors (Basel); 2017 Jun; 17(6):. PubMed ID: 28629131
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Traceable ciphertext-policy attribute-based encryption scheme with attribute level user revocation for cloud storage.
    Wang S; Guo K; Zhang Y
    PLoS One; 2018; 13(9):e0203225. PubMed ID: 30212473
    [TBL] [Abstract][Full Text] [Related]  

  • 6. A lightweight attribute-based signcryption scheme based on cloud-fog assisted in smart healthcare.
    Sun Y; Du X; Niu S; Zhou S
    PLoS One; 2024; 19(1):e0297002. PubMed ID: 38289917
    [TBL] [Abstract][Full Text] [Related]  

  • 7. An efficient and secure attribute based signcryption scheme with LSSS access structure.
    Hong H; Sun Z
    Springerplus; 2016; 5():644. PubMed ID: 27330910
    [TBL] [Abstract][Full Text] [Related]  

  • 8. A searchable personal health records framework with fine-grained access control in cloud-fog computing.
    Sun J; Wang X; Wang S; Ren L
    PLoS One; 2018; 13(11):e0207543. PubMed ID: 30496194
    [TBL] [Abstract][Full Text] [Related]  

  • 9. An environmental monitoring data sharing scheme based on attribute encryption in cloud-fog computing.
    Yang X; Xi W; Chen A; Wang C
    PLoS One; 2021; 16(9):e0258062. PubMed ID: 34591938
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Searchable and revocable multi-data owner attribute-based encryption scheme with hidden policy in cloud storage.
    Wang S; Gao T; Zhang Y
    PLoS One; 2018; 13(11):e0206126. PubMed ID: 30383840
    [TBL] [Abstract][Full Text] [Related]  

  • 11. A Ring Learning with Errors-Based Ciphertext-Policy Attribute-Based Proxy Re-Encryption Scheme for Secure Big Data Sharing in Cloud Environment.
    Li J; Peng J; Qiao Z
    Big Data; 2024 Oct; 12(5):357-366. PubMed ID: 35417273
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Fine-grained Database Field Search Using Attribute-Based Encryption for E-Healthcare Clouds.
    Guo C; Zhuang R; Jie Y; Ren Y; Wu T; Choo KR
    J Med Syst; 2016 Nov; 40(11):235. PubMed ID: 27653042
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Efficient Privacy-Preserving Access Control Scheme in Electronic Health Records System.
    Ming Y; Zhang T
    Sensors (Basel); 2018 Oct; 18(10):. PubMed ID: 30340411
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Attribute-based encryption scheme with multi-keyword search and supporting attribute revocation in cloud storage.
    Wang S; Yao L; Zhang Y
    PLoS One; 2018; 13(10):e0205675. PubMed ID: 30312345
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Efficiently Multi-User Searchable Encryption Scheme with Attribute Revocation and Grant for Cloud Storage.
    Wang S; Zhang X; Zhang Y
    PLoS One; 2016; 11(11):e0167157. PubMed ID: 27898703
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Survey on Revocation in Ciphertext-Policy Attribute-Based Encryption.
    Al-Dahhan RR; Shi Q; Lee GM; Kifayat K
    Sensors (Basel); 2019 Apr; 19(7):. PubMed ID: 30970678
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Access Control Based on Ciphertext Attribute Authentication and Threshold Policy for the Internet of Things.
    Zhang Q; Li Y; Li Z; Yuan J; Gan Y; Luo X
    Sensors (Basel); 2019 Nov; 19(23):. PubMed ID: 31795236
    [TBL] [Abstract][Full Text] [Related]  

  • 18. High efficient key-insulated attribute based encryption scheme without bilinear pairing operations.
    Hong H; Sun Z
    Springerplus; 2016; 5():131. PubMed ID: 26933630
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Searchable attribute-based encryption scheme with attribute revocation in cloud storage.
    Wang S; Zhao D; Zhang Y
    PLoS One; 2017; 12(8):e0183459. PubMed ID: 28859125
    [TBL] [Abstract][Full Text] [Related]  

  • 20. SELAMAT: A New Secure and Lightweight Multi-Factor Authentication Scheme for Cross-Platform Industrial IoT Systems.
    Khalid H; Hashim SJ; Ahmad SMS; Hashim F; Chaudhary MA
    Sensors (Basel); 2021 Feb; 21(4):. PubMed ID: 33670675
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 18.