BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

170 related articles for article (PubMed ID: 30970678)

  • 1. Survey on Revocation in Ciphertext-Policy Attribute-Based Encryption.
    Al-Dahhan RR; Shi Q; Lee GM; Kifayat K
    Sensors (Basel); 2019 Apr; 19(7):. PubMed ID: 30970678
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Online/Offline MA-CP-ABE with Cryptographic Reverse Firewalls for IoT.
    Li J; Fan Y; Bian X; Yuan Q
    Entropy (Basel); 2023 Apr; 25(4):. PubMed ID: 37190404
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Traceable ciphertext-policy attribute-based encryption scheme with attribute level user revocation for cloud storage.
    Wang S; Guo K; Zhang Y
    PLoS One; 2018; 13(9):e0203225. PubMed ID: 30212473
    [TBL] [Abstract][Full Text] [Related]  

  • 4. A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing.
    Fan K; Wang J; Wang X; Li H; Yang Y
    Sensors (Basel); 2017 Jul; 17(7):. PubMed ID: 28737733
    [TBL] [Abstract][Full Text] [Related]  

  • 5. A revocable storage CP-ABE scheme with constant ciphertext length in cloud storage.
    Zhao Y; Xie X; Zhang X; Ding Y
    Math Biosci Eng; 2019 May; 16(5):4229-4249. PubMed ID: 31499660
    [TBL] [Abstract][Full Text] [Related]  

  • 6. A Hybrid Scheme for Fine-Grained Search and Access Authorization in Fog Computing Environment.
    Xiao M; Zhou J; Liu X; Jiang M
    Sensors (Basel); 2017 Jun; 17(6):. PubMed ID: 28629131
    [TBL] [Abstract][Full Text] [Related]  

  • 7. A Lightweight CP-ABE Scheme with Direct Attribute Revocation for Vehicular Ad Hoc Network.
    Liu Y; Xu S; Yue Z
    Entropy (Basel); 2023 Jun; 25(7):. PubMed ID: 37509926
    [TBL] [Abstract][Full Text] [Related]  

  • 8. A survey of research progress and development tendency of attribute-based encryption.
    Pang L; Yang J; Jiang Z
    ScientificWorldJournal; 2014; 2014():193426. PubMed ID: 25101313
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation.
    Xu Q; Tan C; Fan Z; Zhu W; Xiao Y; Cheng F
    Sensors (Basel); 2018 May; 18(5):. PubMed ID: 29772840
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Revocable and Traceable Undeniable Attribute-Based Encryption in Cloud-Enabled E-Health Systems.
    He Z; Chen Y; Luo Y; Zhang L; Tang Y
    Entropy (Basel); 2023 Dec; 26(1):. PubMed ID: 38248171
    [TBL] [Abstract][Full Text] [Related]  

  • 11. A Secured Proxy-Based Data Sharing Module in IoT Environments Using Blockchain.
    Obour Agyekum KO; Xia Q; Sifah EB; Gao J; Xia H; Du X; Guizani M
    Sensors (Basel); 2019 Mar; 19(5):. PubMed ID: 30862110
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Attribute-Based Encryption Schemes for Next Generation Wireless IoT Networks: A Comprehensive Survey.
    Shruti ; Rani S; Sah DK; Gianini G
    Sensors (Basel); 2023 Jun; 23(13):. PubMed ID: 37447769
    [TBL] [Abstract][Full Text] [Related]  

  • 13. CESCR: CP-ABE for efficient and secure sharing of data in collaborative ehealth with revocation and no dummy attribute.
    Edemacu K; Jang B; Kim JW
    PLoS One; 2021; 16(5):e0250992. PubMed ID: 33974672
    [TBL] [Abstract][Full Text] [Related]  

  • 14. A Ring Learning with Errors-Based Ciphertext-Policy Attribute-Based Proxy Re-Encryption Scheme for Secure Big Data Sharing in Cloud Environment.
    Li J; Peng J; Qiao Z
    Big Data; 2022 Apr; ():. PubMed ID: 35417273
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Efficiently Multi-User Searchable Encryption Scheme with Attribute Revocation and Grant for Cloud Storage.
    Wang S; Zhang X; Zhang Y
    PLoS One; 2016; 11(11):e0167157. PubMed ID: 27898703
    [TBL] [Abstract][Full Text] [Related]  

  • 16. A Study on CP-ABE-based Medical Data Sharing System with Key Abuse Prevention and Verifiable Outsourcing in the IoMT Environment.
    Hwang YW; Lee IY
    Sensors (Basel); 2020 Aug; 20(17):. PubMed ID: 32878202
    [TBL] [Abstract][Full Text] [Related]  

  • 17. An Efficient Ciphertext-Policy Weighted Attribute-Based Encryption for the Internet of Health Things.
    Li H; Yu K; Liu B; Feng C; Qin Z; Srivastava G
    IEEE J Biomed Health Inform; 2022 May; 26(5):1949-1960. PubMed ID: 33905340
    [TBL] [Abstract][Full Text] [Related]  

  • 18. An Access Control Scheme Based on Blockchain and Ciphertext Policy-Attribute Based Encryption.
    Hu R; Ma Z; Li L; Zuo P; Li X; Wei J; Liu S
    Sensors (Basel); 2023 Sep; 23(19):. PubMed ID: 37836868
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Attribute-based encryption scheme with multi-keyword search and supporting attribute revocation in cloud storage.
    Wang S; Yao L; Zhang Y
    PLoS One; 2018; 13(10):e0205675. PubMed ID: 30312345
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Combining IOTA and Attribute-Based Encryption for Access Control in the Internet of Things.
    Zhang Y; Nakanishi R; Sasabe M; Kasahara S
    Sensors (Basel); 2021 Jul; 21(15):. PubMed ID: 34372293
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 9.