These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

112 related articles for article (PubMed ID: 31667298)

  • 1. Encrypted audio dataset based on the Collatz conjecture.
    Renza D; Mendoza S; Ballesteros L DM
    Data Brief; 2019 Oct; 26():104537. PubMed ID: 31667298
    [TBL] [Abstract][Full Text] [Related]  

  • 2. A Novel Image Encryption Scheme Based on Collatz Conjecture.
    Ballesteros DM; Peña J; Renza D
    Entropy (Basel); 2018 Nov; 20(12):. PubMed ID: 33266625
    [TBL] [Abstract][Full Text] [Related]  

  • 3. High-capacity reversible data hiding in encrypted images based on two-phase histogram shifting.
    Chen KM; Chang CC
    Math Biosci Eng; 2019 May; 16(5):3947-3964. PubMed ID: 31499644
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification.
    Davies SR; Macfarlane R; Buchanan WJ
    Entropy (Basel); 2022 Oct; 24(10):. PubMed ID: 37420524
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Preserving Health Care Data Security and Privacy Using Carmichael's Theorem-Based Homomorphic Encryption and Modified Enhanced Homomorphic Encryption Schemes in Edge Computing Systems.
    Kumari KA; Sharma A; Chakraborty C; Ananyaa M
    Big Data; 2022 Feb; 10(1):1-17. PubMed ID: 34375143
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Cryptographic Algorithms with Data Shorter than the Encryption Key, Based on LZW and Huffman Coding.
    Krokosz T; Rykowski J; Zajęcka M; Brzoza-Woch R; Rutkowski L
    Sensors (Basel); 2023 Aug; 23(17):. PubMed ID: 37687864
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Complex entropy based encryption and decryption technique for securing medical images.
    Kumar V; Pathak V; Badal N; Pandey PS; Mishra R; Gupta SK
    Multimed Tools Appl; 2022; 81(26):37441-37459. PubMed ID: 35912061
    [TBL] [Abstract][Full Text] [Related]  

  • 8. An Identity-Based (IDB) Broadcast Encryption Scheme with Personalized Messages (BEPM).
    Xu K; Liao Y; Qiao L; Liu Z; Yang X
    PLoS One; 2015; 10(12):e0143975. PubMed ID: 26629817
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Private predictive analysis on encrypted medical data.
    Bos JW; Lauter K; Naehrig M
    J Biomed Inform; 2014 Aug; 50():234-43. PubMed ID: 24835616
    [TBL] [Abstract][Full Text] [Related]  

  • 10. A Novel Image Encryption Technique Based on Cyclic Codes over Galois Field.
    Asif M; Asamoah JKK; Hazzazi MM; Alharbi AR; Ashraf MU; Alghamdi AM
    Comput Intell Neurosci; 2022; 2022():1912603. PubMed ID: 35178075
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Privacy preserving probabilistic record linkage (P3RL): a novel method for linking existing health-related data and maintaining participant confidentiality.
    Schmidlin K; Clough-Gorr KM; Spoerri A;
    BMC Med Res Methodol; 2015 May; 15():46. PubMed ID: 26024886
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Private queries on encrypted genomic data.
    Çetin GS; Chen H; Laine K; Lauter K; Rindal P; Xia Y
    BMC Med Genomics; 2017 Jul; 10(Suppl 2):45. PubMed ID: 28786359
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Image Encryption Method Using New Concept of Compound Blood Transfusion Rule with Multiple Chaotic Maps.
    Gupta R; Pachauri R; Singh AK
    Curr Med Imaging; 2020; 16(8):1034-1043. PubMed ID: 33081664
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Secure medical image encryption with Walsh-Hadamard transform and lightweight cryptography algorithm.
    Kasim Ö
    Med Biol Eng Comput; 2022 Jun; 60(6):1585-1594. PubMed ID: 35389195
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Multiuser communication scheme based on binary phase-shift keying and chaos for telemedicine.
    Michel-Macarty JA; Murillo-Escobar MA; López-Gutiérrez RM; Cruz-Hernández C; Cardoza-Avendaño L
    Comput Methods Programs Biomed; 2018 Aug; 162():165-175. PubMed ID: 29903483
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Neutralization Method of Ransomware Detection Technology Using Format Preserving Encryption.
    Lee J; Lee SY; Yim K; Lee K
    Sensors (Basel); 2023 May; 23(10):. PubMed ID: 37430642
    [TBL] [Abstract][Full Text] [Related]  

  • 17. A Novel Hybrid Secure Image Encryption Based on the Shuffle Algorithm and the Hidden Attractor Chaos System.
    Jin X; Duan X; Jin H; Ma Y
    Entropy (Basel); 2020 Jun; 22(6):. PubMed ID: 33286412
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Research on Color Image Encryption Algorithm Based on Bit-Plane and Chen Chaotic System.
    Xu J; Zhao B; Wu Z
    Entropy (Basel); 2022 Jan; 24(2):. PubMed ID: 35205481
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Towards Secure Big Data Analysis via Fully Homomorphic Encryption Algorithms.
    Hamza R; Hassan A; Ali A; Bashir MB; Alqhtani SM; Tawfeeg TM; Yousif A
    Entropy (Basel); 2022 Apr; 24(4):. PubMed ID: 35455182
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Chaotic medical image encryption method using attention mechanism fusion ResNet model.
    Li X; Peng H
    Front Neurosci; 2023; 17():1226154. PubMed ID: 37521702
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 6.