These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

290 related articles for article (PubMed ID: 30452455)

  • 21. A semi-symmetric image encryption scheme based on the function projective synchronization of two hyperchaotic systems.
    Di X; Li J; Qi H; Cong L; Yang H
    PLoS One; 2017; 12(9):e0184586. PubMed ID: 28910349
    [TBL] [Abstract][Full Text] [Related]  

  • 22. On the security of a new image encryption scheme based on chaotic map lattices.
    Arroyo D; Rhouma R; Alvarez G; Li S; Fernandez V
    Chaos; 2008 Sep; 18(3):033112. PubMed ID: 19045450
    [TBL] [Abstract][Full Text] [Related]  

  • 23. Short Review on Quantum Key Distribution Protocols.
    Giampouris D
    Adv Exp Med Biol; 2017; 988():149-157. PubMed ID: 28971396
    [TBL] [Abstract][Full Text] [Related]  

  • 24. Full-field implementation of a perfect eavesdropper on a quantum cryptography system.
    Gerhardt I; Liu Q; Lamas-Linares A; Skaar J; Kurtsiefer C; Makarov V
    Nat Commun; 2011 Jun; 2():349. PubMed ID: 21673670
    [TBL] [Abstract][Full Text] [Related]  

  • 25. Comment on "Cheating prevention in visual cryptography".
    Chen YC; Horng G; Tsai DS
    IEEE Trans Image Process; 2012 Jul; 21(7):3319-23. PubMed ID: 22410333
    [TBL] [Abstract][Full Text] [Related]  

  • 26. Quantum advantage for probabilistic one-time programs.
    Roehsner MC; Kettlewell JA; Batalhão TB; Fitzsimons JF; Walther P
    Nat Commun; 2018 Dec; 9(1):5225. PubMed ID: 30523249
    [TBL] [Abstract][Full Text] [Related]  

  • 27. EEG based image encryption via quantum walks.
    Rawat N; Shin Y; Balasingham I
    Annu Int Conf IEEE Eng Med Biol Soc; 2016 Aug; 2016():231-234. PubMed ID: 28268319
    [TBL] [Abstract][Full Text] [Related]  

  • 28. Measurement-device-independent quantum communication without encryption.
    Niu PH; Zhou ZR; Lin ZS; Sheng YB; Yin LG; Long GL
    Sci Bull (Beijing); 2018 Oct; 63(20):1345-1350. PubMed ID: 36658905
    [TBL] [Abstract][Full Text] [Related]  

  • 29. [Security services: an overview of the French legislation on cryptography].
    Quantin C; Kerkri E; Allaert FA; Bouzelat H; Dusserre L
    Rev Epidemiol Sante Publique; 2000 Jan; 48(1):81-7. PubMed ID: 10740087
    [TBL] [Abstract][Full Text] [Related]  

  • 30. Quantum mechanics and cellular information processing: the self-assembly paradigm.
    Conrad M
    Biomed Biochim Acta; 1990; 49(8-9):743-55. PubMed ID: 2082919
    [TBL] [Abstract][Full Text] [Related]  

  • 31. A Semi-Quantum Secret-Sharing Protocol with a High Channel Capacity.
    Tian Y; Bian G; Chang J; Tang Y; Li J; Ye C
    Entropy (Basel); 2023 Apr; 25(5):. PubMed ID: 37238497
    [TBL] [Abstract][Full Text] [Related]  

  • 32. An Improvement to a Multi-Client Searchable Encryption Scheme for Boolean Queries.
    Jiang H; Li X; Xu Q
    J Med Syst; 2016 Dec; 40(12):255. PubMed ID: 27722978
    [TBL] [Abstract][Full Text] [Related]  

  • 33. One-time-pad cryptography scheme based on a three-dimensional DNA self-assembly pyramid structure.
    Peng W; Cheng D; Song C
    PLoS One; 2018; 13(11):e0206612. PubMed ID: 30399178
    [TBL] [Abstract][Full Text] [Related]  

  • 34. Double images encryption method with resistance against the specific attack based on an asymmetric algorithm.
    Wang X; Zhao D
    Opt Express; 2012 May; 20(11):11994-2003. PubMed ID: 22714185
    [TBL] [Abstract][Full Text] [Related]  

  • 35. A no-key-exchange secure image sharing scheme based on Shamir's three-pass cryptography protocol and the multiple-parameter fractional Fourier transform.
    Lang J
    Opt Express; 2012 Jan; 20(3):2386-98. PubMed ID: 22330477
    [TBL] [Abstract][Full Text] [Related]  

  • 36. Constructing Pairing-Friendly Elliptic Curves under Embedding Degree 1 for Securing Critical Infrastructures.
    Wang M; Dai G; Choo KK; Jayaraman PP; Ranjan R
    PLoS One; 2016; 11(8):e0161857. PubMed ID: 27564373
    [TBL] [Abstract][Full Text] [Related]  

  • 37. Unbounded and revocable hierarchical identity-based encryption with adaptive security, decryption key exposure resistant, and short public parameters.
    Xing Q; Wang B; Wang X; Tao J
    PLoS One; 2018; 13(4):e0195204. PubMed ID: 29649326
    [TBL] [Abstract][Full Text] [Related]  

  • 38. A Hash-Based Quantum-Resistant Chameleon Signature Scheme.
    Thanalakshmi P; Anitha R; Anbazhagan N; Cho W; Joshi GP; Yang E
    Sensors (Basel); 2021 Dec; 21(24):. PubMed ID: 34960507
    [TBL] [Abstract][Full Text] [Related]  

  • 39. Assessing the performance of a method of simultaneous compression and encryption of multiple images and its resistance against various attacks.
    Alfalou A; Brosseau C; Abdallah N; Jridi M
    Opt Express; 2013 Apr; 21(7):8025-43. PubMed ID: 23571893
    [TBL] [Abstract][Full Text] [Related]  

  • 40. A New Quantum Blind Signature Scheme with BB84-State.
    Chen FL; Wang ZH; Hu YM
    Entropy (Basel); 2019 Mar; 21(4):. PubMed ID: 33267050
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 15.