These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

131 related articles for article (PubMed ID: 31200535)

  • 1. An Efficient Key Generation for the Internet of Things Based Synchronized Quantization.
    Yuliana M; ;
    Sensors (Basel); 2019 Jun; 19(12):. PubMed ID: 31200535
    [TBL] [Abstract][Full Text] [Related]  

  • 2. An Enhanced Architecture to Resolve Public-Key Cryptographic Issues in the Internet of Things (IoT), Employing Quantum Computing Supremacy.
    Shamshad S; Riaz F; Riaz R; Rizvi SS; Abdulla S
    Sensors (Basel); 2022 Oct; 22(21):. PubMed ID: 36365848
    [TBL] [Abstract][Full Text] [Related]  

  • 3. The Cryptographic Key Distribution System for IoT Systems in the MQTT Environment.
    Furtak J
    Sensors (Basel); 2023 May; 23(11):. PubMed ID: 37299828
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Cryptographic Keys Generating and Renewing System for IoT Network Nodes-A Concept.
    Furtak J
    Sensors (Basel); 2020 Sep; 20(17):. PubMed ID: 32899380
    [TBL] [Abstract][Full Text] [Related]  

  • 5. A Practical Evaluation of a High-Security Energy-Efficient Gateway for IoT Fog Computing Applications.
    Suárez-Albela M; Fernández-Caramés TM; Fraga-Lamas P; Castedo L
    Sensors (Basel); 2017 Aug; 17(9):. PubMed ID: 28850104
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Compact Finite Field Multiplication Processor Structure for Cryptographic Algorithms in IoT Devices with Limited Resources.
    Ibrahim A; Gebali F
    Sensors (Basel); 2022 Mar; 22(6):. PubMed ID: 35336260
    [TBL] [Abstract][Full Text] [Related]  

  • 7. A Practical Evaluation on RSA and ECC-Based Cipher Suites for IoT High-Security Energy-Efficient Fog and Mist Computing Devices.
    Suárez-Albela M; Fraga-Lamas P; Fernández-Caramés TM
    Sensors (Basel); 2018 Nov; 18(11):. PubMed ID: 30423831
    [TBL] [Abstract][Full Text] [Related]  

  • 8. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks.
    Kim KW; Han YH; Min SG
    Sensors (Basel); 2017 Sep; 17(10):. PubMed ID: 28934152
    [TBL] [Abstract][Full Text] [Related]  

  • 9. IoT-Based Multi-Sensor Healthcare Architectures and a Lightweight-Based Privacy Scheme.
    Aivaliotis V; Tsantikidou K; Sklavos N
    Sensors (Basel); 2022 Jun; 22(11):. PubMed ID: 35684890
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Graph Layer Security: Encrypting Information via Common Networked Physics.
    Wei Z; Wang L; Sun SC; Li B; Guo W
    Sensors (Basel); 2022 May; 22(10):. PubMed ID: 35632362
    [TBL] [Abstract][Full Text] [Related]  

  • 11. A secure remote user authentication scheme for 6LoWPAN-based Internet of Things.
    Abbas G; Tanveer M; Abbas ZH; Waqas M; Baker T; Al-Jumeily Obe D
    PLoS One; 2021; 16(11):e0258279. PubMed ID: 34748568
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Design and Analysis of Area and Energy Efficient Reconfigurable Cryptographic Accelerator for Securing IoT Devices.
    Zhang X; Liu B; Zhao Y; Hu X; Shen Z; Zheng Z; Liu Z; Chong KS; Yu G; Wang C; Zou X
    Sensors (Basel); 2022 Nov; 22(23):. PubMed ID: 36501862
    [TBL] [Abstract][Full Text] [Related]  

  • 13. A Secure Communication System for Constrained IoT Devices-Experiences and Recommendations.
    Goworko M; Wytrębowicz J
    Sensors (Basel); 2021 Oct; 21(20):. PubMed ID: 34696119
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Secure lightweight cryptosystem for IoT and pervasive computing.
    Abutaha M; Atawneh B; Hammouri L; Kaddoum G
    Sci Rep; 2022 Nov; 12(1):19649. PubMed ID: 36385267
    [TBL] [Abstract][Full Text] [Related]  

  • 15. A Comparative Study of Post-Quantum Cryptosystems for Internet-of-Things Applications.
    Septien-Hernandez JA; Arellano-Vazquez M; Contreras-Cruz MA; Ramirez-Paredes JP
    Sensors (Basel); 2022 Jan; 22(2):. PubMed ID: 35062450
    [TBL] [Abstract][Full Text] [Related]  

  • 16. An Authentication-Based Secure Data Aggregation Method in Internet of Things.
    Ataei Nezhad M; Barati H; Barati A
    J Grid Comput; 2022; 20(3):29. PubMed ID: 35991685
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Clock Frequency Impact on the Performance of High-Security Cryptographic Cipher Suites for Energy-Efficient Resource-Constrained IoT Devices.
    Suárez-Albela M; Fraga-Lamas P; Castedo L; Fernández-Caramés TM
    Sensors (Basel); 2018 Dec; 19(1):. PubMed ID: 30577524
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Online/Offline MA-CP-ABE with Cryptographic Reverse Firewalls for IoT.
    Li J; Fan Y; Bian X; Yuan Q
    Entropy (Basel); 2023 Apr; 25(4):. PubMed ID: 37190404
    [TBL] [Abstract][Full Text] [Related]  

  • 19. A Smart Card-Based Two-Factor Mutual Authentication Scheme for Efficient Deployment of an IoT-Based Telecare Medical Information System.
    Khan MA; Alhakami H; Alhakami W; Shvetsov AV; Ullah I
    Sensors (Basel); 2023 Jun; 23(12):. PubMed ID: 37420585
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Intrusion Detection in Internet of Things Systems: A Review on Design Approaches Leveraging Multi-Access Edge Computing, Machine Learning, and Datasets.
    Gyamfi E; Jurcut A
    Sensors (Basel); 2022 May; 22(10):. PubMed ID: 35632153
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 7.