BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

173 related articles for article (PubMed ID: 29973569)

  • 1. Hidden Policy Attribute-Based Data Sharing with Direct Revocation and Keyword Search in Cloud Computing.
    Wu A; Zheng D; Zhang Y; Yang M
    Sensors (Basel); 2018 Jul; 18(7):. PubMed ID: 29973569
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Attribute-based encryption scheme with multi-keyword search and supporting attribute revocation in cloud storage.
    Wang S; Yao L; Zhang Y
    PLoS One; 2018; 13(10):e0205675. PubMed ID: 30312345
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Searchable and revocable multi-data owner attribute-based encryption scheme with hidden policy in cloud storage.
    Wang S; Gao T; Zhang Y
    PLoS One; 2018; 13(11):e0206126. PubMed ID: 30383840
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Searchable attribute-based encryption scheme with attribute revocation in cloud storage.
    Wang S; Zhao D; Zhang Y
    PLoS One; 2017; 12(8):e0183459. PubMed ID: 28859125
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Efficiently Multi-User Searchable Encryption Scheme with Attribute Revocation and Grant for Cloud Storage.
    Wang S; Zhang X; Zhang Y
    PLoS One; 2016; 11(11):e0167157. PubMed ID: 27898703
    [TBL] [Abstract][Full Text] [Related]  

  • 6. A keyword searchable attribute-based encryption scheme with attribute update for cloud storage.
    Wang S; Ye J; Zhang Y
    PLoS One; 2018; 13(5):e0197318. PubMed ID: 29795577
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Traceable ciphertext-policy attribute-based encryption scheme with attribute level user revocation for cloud storage.
    Wang S; Guo K; Zhang Y
    PLoS One; 2018; 13(9):e0203225. PubMed ID: 30212473
    [TBL] [Abstract][Full Text] [Related]  

  • 8. A Hybrid Scheme for Fine-Grained Search and Access Authorization in Fog Computing Environment.
    Xiao M; Zhou J; Liu X; Jiang M
    Sensors (Basel); 2017 Jun; 17(6):. PubMed ID: 28629131
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation.
    Xu Q; Tan C; Fan Z; Zhu W; Xiao Y; Cheng F
    Sensors (Basel); 2018 May; 18(5):. PubMed ID: 29772840
    [TBL] [Abstract][Full Text] [Related]  

  • 10. A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing.
    Fan K; Wang J; Wang X; Li H; Yang Y
    Sensors (Basel); 2017 Jul; 17(7):. PubMed ID: 28737733
    [TBL] [Abstract][Full Text] [Related]  

  • 11. A Ring Learning with Errors-Based Ciphertext-Policy Attribute-Based Proxy Re-Encryption Scheme for Secure Big Data Sharing in Cloud Environment.
    Li J; Peng J; Qiao Z
    Big Data; 2022 Apr; ():. PubMed ID: 35417273
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Revocable and Traceable Undeniable Attribute-Based Encryption in Cloud-Enabled E-Health Systems.
    He Z; Chen Y; Luo Y; Zhang L; Tang Y
    Entropy (Basel); 2023 Dec; 26(1):. PubMed ID: 38248171
    [TBL] [Abstract][Full Text] [Related]  

  • 13. A Lightweight CP-ABE Scheme with Direct Attribute Revocation for Vehicular Ad Hoc Network.
    Liu Y; Xu S; Yue Z
    Entropy (Basel); 2023 Jun; 25(7):. PubMed ID: 37509926
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Attribute-based proxy re-encryption with keyword search.
    Shi Y; Liu J; Han Z; Zheng Q; Zhang R; Qiu S
    PLoS One; 2014; 9(12):e116325. PubMed ID: 25549257
    [TBL] [Abstract][Full Text] [Related]  

  • 15. CESCR: CP-ABE for efficient and secure sharing of data in collaborative ehealth with revocation and no dummy attribute.
    Edemacu K; Jang B; Kim JW
    PLoS One; 2021; 16(5):e0250992. PubMed ID: 33974672
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Collaborative Ehealth Privacy and Security: An Access Control With Attribute Revocation Based on OBDD Access Structure.
    Edemacu K; Jang B; Kim JW
    IEEE J Biomed Health Inform; 2020 Oct; 24(10):2960-2972. PubMed ID: 32071017
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Survey on Revocation in Ciphertext-Policy Attribute-Based Encryption.
    Al-Dahhan RR; Shi Q; Lee GM; Kifayat K
    Sensors (Basel); 2019 Apr; 19(7):. PubMed ID: 30970678
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Attribute-based multi-user collaborative searchable encryption in COVID-19.
    Zhao F; Peng C; Xu D; Liu Y; Niu K; Tang H
    Comput Commun; 2023 May; 205():118-126. PubMed ID: 37128501
    [TBL] [Abstract][Full Text] [Related]  

  • 19. A Secured Proxy-Based Data Sharing Module in IoT Environments Using Blockchain.
    Obour Agyekum KO; Xia Q; Sifah EB; Gao J; Xia H; Du X; Guizani M
    Sensors (Basel); 2019 Mar; 19(5):. PubMed ID: 30862110
    [TBL] [Abstract][Full Text] [Related]  

  • 20. m
    Miao Y; Ma J; Liu X; Wei F; Liu Z; Wang XA
    J Med Syst; 2016 Nov; 40(11):246. PubMed ID: 27696175
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 9.