These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

171 related articles for article (PubMed ID: 30682866)

  • 41. Survey on Prominent RFID Authentication Protocols for Passive Tags.
    Baashirah R; Abuzneid A
    Sensors (Basel); 2018 Oct; 18(10):. PubMed ID: 30360432
    [TBL] [Abstract][Full Text] [Related]  

  • 42. LOADng-IoT: An Enhanced Routing Protocol for Internet of Things Applications over Low Power Networks.
    Sobral J; Rodrigues J; Rabelo R; Saleem K; Furtado V
    Sensors (Basel); 2019 Jan; 19(1):. PubMed ID: 30609865
    [TBL] [Abstract][Full Text] [Related]  

  • 43. A Methodological Approach for Assessing Amplified Reflection Distributed Denial of Service on the Internet of Things.
    Costa Gondim JJ; de Oliveira Albuquerque R; Clayton Alves Nascimento A; García Villalba LJ; Kim TH
    Sensors (Basel); 2016 Nov; 16(11):. PubMed ID: 27827931
    [TBL] [Abstract][Full Text] [Related]  

  • 44. Cost-Effective Network Reordering Using FPGA.
    Hoang VQ; Chen Y
    Sensors (Basel); 2023 Jan; 23(2):. PubMed ID: 36679615
    [TBL] [Abstract][Full Text] [Related]  

  • 45. High throughput resource efficient reconfigurable interleaver for MIMO WLAN application.
    Upadhyaya BK; Pramanik PKD; Sanyal SK
    PeerJ Comput Sci; 2021; 7():e581. PubMed ID: 34179450
    [TBL] [Abstract][Full Text] [Related]  

  • 46. A malicious pattern detection engine for embedded security systems in the Internet of Things.
    Oh D; Kim D; Ro WW
    Sensors (Basel); 2014 Dec; 14(12):24188-211. PubMed ID: 25521382
    [TBL] [Abstract][Full Text] [Related]  

  • 47. A compact and efficient AES-32GF for encryption in small IoT devices.
    Dhanda SS; Jindal P; Singh B; Panwar D
    MethodsX; 2023 Dec; 11():102491. PubMed ID: 38076709
    [TBL] [Abstract][Full Text] [Related]  

  • 48. A Lightweight Anonymous Client⁻Server Authentication Scheme for the Internet of Things Scenario: LAuth.
    Chen Y; Martínez JF; Castillejo P; López L
    Sensors (Basel); 2018 Oct; 18(11):. PubMed ID: 30380793
    [TBL] [Abstract][Full Text] [Related]  

  • 49. A Machine Learning Attack Resilient True Random Number Generator Based on Stochastic Programming of Atomically Thin Transistors.
    Wali A; Ravichandran H; Das S
    ACS Nano; 2021 Nov; 15(11):17804-17812. PubMed ID: 34665596
    [TBL] [Abstract][Full Text] [Related]  

  • 50. Mapping Neural Networks to FPGA-Based IoT Devices for Ultra-Low Latency Processing.
    Wielgosz M; Karwatowski M
    Sensors (Basel); 2019 Jul; 19(13):. PubMed ID: 31284516
    [TBL] [Abstract][Full Text] [Related]  

  • 51. Real-Time Secure/Unsecure Video Latency Measurement/Analysis with FPGA-Based Bump-in-the-Wire Security.
    Kaknjo A; Rao M; Omerdic E; Newe T; Toal D
    Sensors (Basel); 2019 Jul; 19(13):. PubMed ID: 31284580
    [TBL] [Abstract][Full Text] [Related]  

  • 52. Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes.
    Ali B; Awad AI
    Sensors (Basel); 2018 Mar; 18(3):. PubMed ID: 29518023
    [TBL] [Abstract][Full Text] [Related]  

  • 53. IoT Device Security: Challenging "A Lightweight RFID Mutual Authentication Protocol Based on Physical Unclonable Function".
    Bendavid Y; Bagheri N; Safkhani M; Rostampour S
    Sensors (Basel); 2018 Dec; 18(12):. PubMed ID: 30558323
    [TBL] [Abstract][Full Text] [Related]  

  • 54. Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources.
    Cruz-Piris L; Rivera D; Marsa-Maestre I; de la Hoz E; Velasco JR
    Sensors (Basel); 2018 Mar; 18(3):. PubMed ID: 29558406
    [TBL] [Abstract][Full Text] [Related]  

  • 55. Authentication and Delegation for Operating a Multi-Drone System.
    Bae M; Kim H
    Sensors (Basel); 2019 May; 19(9):. PubMed ID: 31058821
    [TBL] [Abstract][Full Text] [Related]  

  • 56. Guided Electromagnetic Wave Technique for IC Authentication.
    Ahmed MM; Perret E; Hely D; Siragusa R; Barbot N
    Sensors (Basel); 2020 Apr; 20(7):. PubMed ID: 32260505
    [TBL] [Abstract][Full Text] [Related]  

  • 57. A New Privacy-Preserving Handover Authentication Scheme for Wireless Networks.
    Wang C; Yuan Y; Wu J
    Sensors (Basel); 2017 Jun; 17(6):. PubMed ID: 28632171
    [TBL] [Abstract][Full Text] [Related]  

  • 58. PALOT: Profiling and Authenticating Users Leveraging Internet of Things.
    Nespoli P; Zago M; Huertas Celdrán A; Gil Pérez M; Gómez Mármol F; García Clemente FJ
    Sensors (Basel); 2019 Jun; 19(12):. PubMed ID: 31242655
    [TBL] [Abstract][Full Text] [Related]  

  • 59. An Enhanced Three-Factor User Authentication Scheme Using Elliptic Curve Cryptosystem for Wireless Sensor Networks.
    Wang C; Xu G; Sun J
    Sensors (Basel); 2017 Dec; 17(12):. PubMed ID: 29257066
    [TBL] [Abstract][Full Text] [Related]  

  • 60. A Randomized Watermarking Technique for Detecting Malicious Data Injection Attacks in Heterogeneous Wireless Sensor Networks for Internet of Things Applications.
    Alromih A; Al-Rodhaan M; Tian Y
    Sensors (Basel); 2018 Dec; 18(12):. PubMed ID: 30544877
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 9.