These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

117 related articles for article (PubMed ID: 30779766)

  • 41. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography.
    Reddy AG; Das AK; Odelu V; Yoo KY
    PLoS One; 2016; 11(5):e0154308. PubMed ID: 27163786
    [TBL] [Abstract][Full Text] [Related]  

  • 42. A Practical Evaluation on RSA and ECC-Based Cipher Suites for IoT High-Security Energy-Efficient Fog and Mist Computing Devices.
    Suárez-Albela M; Fraga-Lamas P; Fernández-Caramés TM
    Sensors (Basel); 2018 Nov; 18(11):. PubMed ID: 30423831
    [TBL] [Abstract][Full Text] [Related]  

  • 43. Cryptanalysis and improvement of an improved two factor authentication protocol for telecare medical information systems.
    Chaudhry SA; Naqvi H; Shon T; Sher M; Farash MS
    J Med Syst; 2015 Jun; 39(6):66. PubMed ID: 25912427
    [TBL] [Abstract][Full Text] [Related]  

  • 44. Security and efficiency enhancement of an anonymous three-party password-authenticated key agreement using extended chaotic maps.
    Xie Q; Lu Y; Tan X; Tang Z; Hu B
    PLoS One; 2018; 13(10):e0203984. PubMed ID: 30289897
    [TBL] [Abstract][Full Text] [Related]  

  • 45. Security analysis of the unrestricted identity-based aggregate signature scheme.
    Lee K; Lee DH
    PLoS One; 2015; 10(5):e0128081. PubMed ID: 25993247
    [TBL] [Abstract][Full Text] [Related]  

  • 46. HERON QUADRILATERALS VIA ELLIPTIC CURVES.
    Izadi F; Khoshnam F; Moody D
    Rocky Mt J Math; 2017; 47():. PubMed ID: 31274932
    [TBL] [Abstract][Full Text] [Related]  

  • 47. GEOMETRIC PROGRESSIONS ON ELLIPTIC CURVES.
    Ciss AA; Moody D
    Glas Mat; 2017; 52(1):1-10. PubMed ID: 28890552
    [TBL] [Abstract][Full Text] [Related]  

  • 48. On the improvement of Wiener attack on RSA with small private exponent.
    Wu ME; Chen CM; Lin YH; Sun HM
    ScientificWorldJournal; 2014; 2014():650537. PubMed ID: 24982974
    [TBL] [Abstract][Full Text] [Related]  

  • 49. An Efficient Remote Authentication Scheme for Wireless Body Area Network.
    Omala AA; Kibiwott KP; Li F
    J Med Syst; 2017 Feb; 41(2):25. PubMed ID: 28004287
    [TBL] [Abstract][Full Text] [Related]  

  • 50. Lossless generalized-lSB data embedding.
    Celik MU; Sharma G; Tekalp AM; Saber E
    IEEE Trans Image Process; 2005 Feb; 14(2):253-66. PubMed ID: 15700530
    [TBL] [Abstract][Full Text] [Related]  

  • 51. Medical image watermarking using bit threshold map based on just noticeable distortion in discrete cosine transform.
    Seo HU; Wei Q; Kwon SG; Sohng KI
    Technol Health Care; 2017 Jul; 25(S1):367-375. PubMed ID: 28582925
    [TBL] [Abstract][Full Text] [Related]  

  • 52. On the Security of a Two-Factor Authentication and Key Agreement Scheme for Telecare Medicine Information Systems.
    Arshad H; Teymoori V; Nikooghadam M; Abbassi H
    J Med Syst; 2015 Aug; 39(8):76. PubMed ID: 26084586
    [TBL] [Abstract][Full Text] [Related]  

  • 53. An Extended Chaotic Maps-Based Three-Party Password-Authenticated Key Agreement with User Anonymity.
    Lu Y; Li L; Zhang H; Yang Y
    PLoS One; 2016; 11(4):e0153870. PubMed ID: 27101305
    [TBL] [Abstract][Full Text] [Related]  

  • 54. An Efficient and Practical Smart Card Based Anonymity Preserving User Authentication Scheme for TMIS using Elliptic Curve Cryptography.
    Amin R; Islam SK; Biswas GP; Khan MK; Kumar N
    J Med Syst; 2015 Nov; 39(11):180. PubMed ID: 26433889
    [TBL] [Abstract][Full Text] [Related]  

  • 55. An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System.
    Li CT; Wu TY; Chen CL; Lee CC; Chen CM
    Sensors (Basel); 2017 Jun; 17(7):. PubMed ID: 28644381
    [TBL] [Abstract][Full Text] [Related]  

  • 56. On the verification of intransitive noninterference in mulitlevel security.
    Ben Hadj-Alouane N; Lafrance S; Lin F; Mullins J; Yeddes MM
    IEEE Trans Syst Man Cybern B Cybern; 2005 Oct; 35(5):948-58. PubMed ID: 16240770
    [TBL] [Abstract][Full Text] [Related]  

  • 57. Finite-element neural networks for solving differential equations.
    Ramuhalli P; Udpa L; Udpa SS
    IEEE Trans Neural Netw; 2005 Nov; 16(6):1381-92. PubMed ID: 16342482
    [TBL] [Abstract][Full Text] [Related]  

  • 58. A Practical Evaluation of a High-Security Energy-Efficient Gateway for IoT Fog Computing Applications.
    Suárez-Albela M; Fernández-Caramés TM; Fraga-Lamas P; Castedo L
    Sensors (Basel); 2017 Aug; 17(9):. PubMed ID: 28850104
    [TBL] [Abstract][Full Text] [Related]  

  • 59. A recoverable AMBTC authentication scheme using similarity embedding strategy.
    Hong W; Zhou X; Lou DC
    PLoS One; 2019; 14(2):e0212802. PubMed ID: 30811472
    [TBL] [Abstract][Full Text] [Related]  

  • 60. A robust anonymous biometric-based authenticated key agreement scheme for multi-server environments.
    Guo H; Wang P; Zhang X; Huang Y; Ma F
    PLoS One; 2017; 12(11):e0187403. PubMed ID: 29121050
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 6.