These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

115 related articles for article (PubMed ID: 30453678)

  • 1. Dynamic Cipher Puzzle for Efficient Broadcast Authentication in Wireless Sensor Networks.
    Afianti F; Wirawan I; Suryani T
    Sensors (Basel); 2018 Nov; 18(11):. PubMed ID: 30453678
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Cryptanalysis and Improvement of a Privacy-Preserving Three-Factor Authentication Protocol for Wireless Sensor Networks.
    Renuka K; Kumar S; Kumari S; Chen CM
    Sensors (Basel); 2019 Oct; 19(21):. PubMed ID: 31653025
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Broadcast authentication for wireless sensor networks using nested hashing and the Chinese remainder theorem.
    Eldefrawy MH; Khan MK; Alghathbar K; Cho ES
    Sensors (Basel); 2010; 10(9):8683-95. PubMed ID: 22163679
    [TBL] [Abstract][Full Text] [Related]  

  • 4. On securing wireless sensor network--novel authentication scheme against DOS attacks.
    Raja KN; Beno MM
    J Med Syst; 2014 Oct; 38(10):84. PubMed ID: 25106827
    [TBL] [Abstract][Full Text] [Related]  

  • 5. A Temporal Credential-Based Mutual Authentication with Multiple-Password Scheme for Wireless Sensor Networks.
    Liu X; Zhang R; Liu Q
    PLoS One; 2017; 12(1):e0170657. PubMed ID: 28135288
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Source Authentication for Code Dissemination Supporting Dynamic Packet Size in Wireless Sensor Networks.
    Kim D; Kim D; An S
    Sensors (Basel); 2016 Jul; 16(7):. PubMed ID: 27409616
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Enhancing Security in ZigBee Wireless Sensor Networks: A New Approach and Mutual Authentication Scheme for D2D Communication.
    Allakany A; Saber A; Mostafa SM; Alsabaan M; Ibrahem MI; Elwahsh H
    Sensors (Basel); 2023 Jun; 23(12):. PubMed ID: 37420868
    [TBL] [Abstract][Full Text] [Related]  

  • 8. An Adaption Broadcast Radius-Based Code Dissemination Scheme for Low Energy Wireless Sensor Networks.
    Yu S; Liu X; Liu A; Xiong N; Cai Z; Wang T
    Sensors (Basel); 2018 May; 18(5):. PubMed ID: 29748525
    [TBL] [Abstract][Full Text] [Related]  

  • 9. RUASN: a robust user authentication framework for wireless sensor networks.
    Kumar P; Choudhury AJ; Sain M; Lee SG; Lee HJ
    Sensors (Basel); 2011; 11(5):5020-46. PubMed ID: 22163888
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Geographic wormhole detection in wireless sensor networks.
    Sookhak M; Akhundzada A; Sookhak A; Eslaminejad M; Gani A; Khurram Khan M; Li X; Wang X
    PLoS One; 2015; 10(1):e0115324. PubMed ID: 25602616
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Simulation Analysis and Comparison of New Hybrid TLI-µTESLA and Variant TESLA Protocols Using SHA-2 and SHA-3 Hash Functions.
    Eledlebi K; Alzubaidi AA; Yeob Yeun C; Damiani E; Mateu V; Al-Hammadi Y
    Sensors (Basel); 2022 Nov; 22(23):. PubMed ID: 36501765
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Secure Authentication Protocol for Wireless Sensor Networks in Vehicular Communications.
    Yu S; Lee J; Lee K; Park K; Park Y
    Sensors (Basel); 2018 Sep; 18(10):. PubMed ID: 30248898
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Enhanced Two-Factor Authentication and Key Agreement Using Dynamic Identities in Wireless Sensor Networks.
    Chang IP; Lee TF; Lin TH; Liu CM
    Sensors (Basel); 2015 Nov; 15(12):29841-54. PubMed ID: 26633396
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Detection of Management-Frames-Based Denial-of-Service Attack in Wireless LAN Network Using Artificial Neural Network.
    Abdallah AE; Hamdan M; Gismalla MSM; Ibrahim AO; Aljurayban NS; Nagmeldin W; Khairi MHH
    Sensors (Basel); 2023 Feb; 23(5):. PubMed ID: 36904866
    [TBL] [Abstract][Full Text] [Related]  

  • 15. An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks.
    Jung J; Kim J; Choi Y; Won D
    Sensors (Basel); 2016 Aug; 16(8):. PubMed ID: 27537890
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Comparative Study on Various Authentication Protocols in Wireless Sensor Networks.
    Rajeswari SR; Seenivasagam V
    ScientificWorldJournal; 2016; 2016():6854303. PubMed ID: 26881272
    [TBL] [Abstract][Full Text] [Related]  

  • 17. ECC-based three-factor authentication and key agreement scheme for wireless sensor networks.
    Huang W
    Sci Rep; 2024 Jan; 14(1):1787. PubMed ID: 38245561
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Authentication Schemes for Healthcare Applications Using Wireless Medical Sensor Networks: A Survey.
    Bahache AN; Chikouche N; Mezrag F
    SN Comput Sci; 2022; 3(5):382. PubMed ID: 35873706
    [TBL] [Abstract][Full Text] [Related]  

  • 19. A secured authentication protocol for wireless sensor networks using elliptic curves cryptography.
    Yeh HL; Chen TH; Liu PC; Kim TH; Wei HW
    Sensors (Basel); 2011; 11(5):4767-79. PubMed ID: 22163874
    [TBL] [Abstract][Full Text] [Related]  

  • 20. A Lightweight Three-Factor Authentication and Key Agreement Scheme in Wireless Sensor Networks for Smart Homes.
    Shin S; Kwon T
    Sensors (Basel); 2019 Apr; 19(9):. PubMed ID: 31035690
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 6.