These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

159 related articles for article (PubMed ID: 30404242)

  • 1. eTPM: A Trusted Cloud Platform Enclave TPM Scheme Based on Intel SGX Technology.
    Sun H; He R; Zhang Y; Wang R; Ip WH; Yung KL
    Sensors (Basel); 2018 Nov; 18(11):. PubMed ID: 30404242
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Centralized Duplicate Removal Video Storage System with Privacy Preservation in IoT.
    Yan H; Li X; Wang Y; Jia C
    Sensors (Basel); 2018 Jun; 18(6):. PubMed ID: 29867037
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Practical and Efficient in-Enclave Verification of Privacy Compliance.
    Liu W; Wang W; Chen H; Wang X; Lu Y; Chen K; Wang X; Shen Q; Chen Y; Tang H
    Proc (Int Conf Dependable Syst Netw); 2021 Jun; 2021():413-425. PubMed ID: 35919377
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Trusted computing strengthens cloud authentication.
    Ghazizadeh E; Zamani M; Ab Manan JL; Alizadeh M
    ScientificWorldJournal; 2014; 2014():260187. PubMed ID: 24701149
    [TBL] [Abstract][Full Text] [Related]  

  • 5. A Blockchain-Based Trusted Edge Platform in Edge Computing Environment.
    Zhang J; Lu C; Cheng G; Guo T; Kang J; Zhang X; Yuan X; Yan X
    Sensors (Basel); 2021 Mar; 21(6):. PubMed ID: 33803561
    [TBL] [Abstract][Full Text] [Related]  

  • 6. HySec-Flow: Privacy-Preserving Genomic Computing with SGX-based Big-Data Analytics Framework.
    Widanage C; Liu W; Li J; Chen H; Wang X; Tang H; Fox J
    IEEE Int Conf Cloud Comput; 2021 Sep; 2021():733-743. PubMed ID: 35662807
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Deep-Hook: A trusted deep learning-based framework for unknown malware detection and classification in Linux cloud environments.
    Landman T; Nissim N
    Neural Netw; 2021 Dec; 144():648-685. PubMed ID: 34656885
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Trust Beyond Border: Lightweight, Verifiable User Isolation for Protecting In-Enclave Services.
    Wang W; Liu W; Chen H; Wang X; Tian H; Lin D
    IEEE Trans Dependable Secure Comput; 2023; 20(1):522-538. PubMed ID: 38152698
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Privacy-preserving genotype imputation in a trusted execution environment.
    Dokmai N; Kockan C; Zhu K; Wang X; Sahinalp SC; Cho H
    Cell Syst; 2021 Oct; 12(10):983-993.e7. PubMed ID: 34450045
    [TBL] [Abstract][Full Text] [Related]  

  • 10. A security-awareness virtual machine management scheme based on Chinese wall policy in cloud computing.
    Yu S; Gui X; Lin J; Tian F; Zhao J; Dai M
    ScientificWorldJournal; 2014; 2014():805923. PubMed ID: 24688434
    [TBL] [Abstract][Full Text] [Related]  

  • 11. An Elliptic Curve Based Schnorr Cloud Security Model in Distributed Environment.
    Muthurajan V; Narayanasamy B
    ScientificWorldJournal; 2016; 2016():4913015. PubMed ID: 26981584
    [TBL] [Abstract][Full Text] [Related]  

  • 12. SM2-Based Offline/Online Efficient Data Integrity Verification Scheme for Multiple Application Scenarios.
    Li X; Yi Z; Li R; Wang XA; Li H; Yang X
    Sensors (Basel); 2023 Apr; 23(9):. PubMed ID: 37177511
    [TBL] [Abstract][Full Text] [Related]  

  • 13. PREMIX: PRivacy-preserving EstiMation of Individual admiXture.
    Chen F; Dow M; Ding S; Lu Y; Jiang X; Tang H; Wang S
    AMIA Annu Symp Proc; 2016; 2016():1747-1755. PubMed ID: 28269933
    [TBL] [Abstract][Full Text] [Related]  

  • 14. The monitoring and managing application of cloud computing based on Internet of Things.
    Luo S; Ren B
    Comput Methods Programs Biomed; 2016 Jul; 130():154-61. PubMed ID: 27208530
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Security Architecture and Protocol for Trust Verifications Regarding the Integrity of Files Stored in Cloud Services.
    Pinheiro A; Dias Canedo E; de Sousa Junior RT; de Oliveira Albuquerque R; GarcĂ­a Villalba LJ; Kim TH
    Sensors (Basel); 2018 Mar; 18(3):. PubMed ID: 29498641
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Trust-Enhanced Cloud Service Selection Model Based on QoS Analysis.
    Pan Y; Ding S; Fan W; Li J; Yang S
    PLoS One; 2015; 10(11):e0143448. PubMed ID: 26606388
    [TBL] [Abstract][Full Text] [Related]  

  • 17. A Distributed Oracle Using Intel SGX for Blockchain-Based IoT Applications.
    Woo S; Song J; Park S
    Sensors (Basel); 2020 May; 20(9):. PubMed ID: 32397644
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Enhancing Data Security of Cloud Based LMS.
    Chatterjee P; Bose R; Banerjee S; Roy S
    Wirel Pers Commun; 2023; 130(2):1123-1139. PubMed ID: 37168441
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Provenance based data integrity checking and verification in cloud environments.
    Imran M; Hlavacs H; Haq IU; Jan B; Khan FA; Ahmad A
    PLoS One; 2017; 12(5):e0177576. PubMed ID: 28545151
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Secure encapsulation and publication of biological services in the cloud computing environment.
    Zhang W; Wang X; Lu B; Kim TH
    Biomed Res Int; 2013; 2013():170580. PubMed ID: 24078906
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 8.