These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

117 related articles for article (PubMed ID: 30779766)

  • 21. Efficient and provable secure pairing-free security-mediated identity-based identification schemes.
    Chin JJ; Tan SY; Heng SH; Phan RC
    ScientificWorldJournal; 2014; 2014():170906. PubMed ID: 25207333
    [TBL] [Abstract][Full Text] [Related]  

  • 22. ON THE FAMILY OF ELLIPTIC CURVES
    Juyal A; Moody D
    Integers; 2021; 21():1-13. PubMed ID: 34413709
    [TBL] [Abstract][Full Text] [Related]  

  • 23. Optimized ECC Implementation for Secure Communication between Heterogeneous IoT Devices.
    Marin L; Pawlowski MP; Jara A
    Sensors (Basel); 2015 Aug; 15(9):21478-99. PubMed ID: 26343677
    [TBL] [Abstract][Full Text] [Related]  

  • 24. A secure RFID mutual authentication protocol for healthcare environments using elliptic curve cryptography.
    Jin C; Xu C; Zhang X; Zhao J
    J Med Syst; 2015 Mar; 39(3):24. PubMed ID: 25666925
    [TBL] [Abstract][Full Text] [Related]  

  • 25. Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation.
    Nam J; Choo KK; Han S; Kim M; Paik J; Won D
    PLoS One; 2015; 10(4):e0116709. PubMed ID: 25849359
    [TBL] [Abstract][Full Text] [Related]  

  • 26. An enhanced biometric-based authentication scheme for telecare medicine information systems using elliptic curve cryptosystem.
    Lu Y; Li L; Peng H; Yang Y
    J Med Syst; 2015 Mar; 39(3):32. PubMed ID: 25681101
    [TBL] [Abstract][Full Text] [Related]  

  • 27. Three-Factor User Authentication and Key Agreement Using Elliptic Curve Cryptosystem in Wireless Sensor Networks.
    Park Y; Park Y
    Sensors (Basel); 2016 Dec; 16(12):. PubMed ID: 27983616
    [TBL] [Abstract][Full Text] [Related]  

  • 28. ACCURATE SOLUTION AND GRADIENT COMPUTATION FOR ELLIPTIC INTERFACE PROBLEMS WITH VARIABLE COEFFICIENTS.
    Li Z; Ji H; Chen X
    SIAM J Numer Anal; 2017; 55(2):570-597. PubMed ID: 28983130
    [TBL] [Abstract][Full Text] [Related]  

  • 29. Elliptic Curve Cryptography for Wireless Sensor Networks Using the Number Theoretic Transform.
    Gulen U; Baktir S
    Sensors (Basel); 2020 Mar; 20(5):. PubMed ID: 32182915
    [TBL] [Abstract][Full Text] [Related]  

  • 30. A Multiserver Biometric Authentication Scheme for TMIS using Elliptic Curve Cryptography.
    Chaudhry SA; Khan MT; Khan MK; Shon T
    J Med Syst; 2016 Nov; 40(11):230. PubMed ID: 27646969
    [TBL] [Abstract][Full Text] [Related]  

  • 31. Circulant embedding with QMC: analysis for elliptic PDE with lognormal coefficients.
    Graham IG; Kuo FY; Nuyens D; Scheichl R; Sloan IH
    Numer Math (Heidelb); 2018; 140(2):479-511. PubMed ID: 30220739
    [TBL] [Abstract][Full Text] [Related]  

  • 32. Unified Compact ECC-AES Co-Processor with Group-Key Support for IoT Devices in Wireless Sensor Networks.
    Parrilla L; Castillo E; López-Ramos JA; Álvarez-Bermejo JA; García A; Morales DP
    Sensors (Basel); 2018 Jan; 18(1):. PubMed ID: 29337921
    [TBL] [Abstract][Full Text] [Related]  

  • 33. High capacity reversible data hiding with interpolation and adaptive embedding.
    Wahed MA; Nyeem H
    PLoS One; 2019; 14(3):e0212093. PubMed ID: 30840659
    [TBL] [Abstract][Full Text] [Related]  

  • 34. Comment on "On the security of a spatiotemporal chaotic cryptosystem" [Chaos 17, 033117 (2007)].
    Wang S; Hu G
    Chaos; 2008 Sep; 18(3):038102. PubMed ID: 19045507
    [TBL] [Abstract][Full Text] [Related]  

  • 35. Atomicity and Regularity Principles Do Not Ensure Full Resistance of ECC Designs against Single-Trace Attacks.
    Kabin I; Dyka Z; Langendoerfer P
    Sensors (Basel); 2022 Apr; 22(8):. PubMed ID: 35459068
    [TBL] [Abstract][Full Text] [Related]  

  • 36. A novel high-capacity data-embedding system.
    Lan TH; Tewfik AH
    IEEE Trans Image Process; 2006 Aug; 15(8):2431-40. PubMed ID: 16900696
    [TBL] [Abstract][Full Text] [Related]  

  • 37. Armed with Faster Crypto: Optimizing Elliptic Curve Cryptography for ARM Processors.
    De Smet R; Blancquaert R; Godden T; Steenhaut K; Braeken A
    Sensors (Basel); 2024 Feb; 24(3):. PubMed ID: 38339747
    [TBL] [Abstract][Full Text] [Related]  

  • 38. On the security of a new image encryption scheme based on chaotic map lattices.
    Arroyo D; Rhouma R; Alvarez G; Li S; Fernandez V
    Chaos; 2008 Sep; 18(3):033112. PubMed ID: 19045450
    [TBL] [Abstract][Full Text] [Related]  

  • 39. Security in Intelligent Transport Systems for Smart Cities: From Theory to Practice.
    Javed MA; Ben Hamida E; Znaidi W
    Sensors (Basel); 2016 Jun; 16(6):. PubMed ID: 27314358
    [TBL] [Abstract][Full Text] [Related]  

  • 40. Combining Cryptography with EEG Biometrics.
    Damaševičius R; Maskeliūnas R; Kazanavičius E; Woźniak M
    Comput Intell Neurosci; 2018; 2018():1867548. PubMed ID: 29951089
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 6.