These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

112 related articles for article (PubMed ID: 31667298)

  • 21. Privacy protection for 3D point cloud classification based on an optical chaotic encryption scheme.
    Liu B; Liu Y; Xie Y; Jiang X; Ye Y; Song T; Chai J; Liu M; Feng M; Yuan H
    Opt Express; 2023 Feb; 31(5):8820-8843. PubMed ID: 36859989
    [TBL] [Abstract][Full Text] [Related]  

  • 22. A secure SNP panel scheme using homomorphically encrypted K-mers without SNP calling on the user side.
    Park S; Kim M; Seo S; Hong S; Han K; Lee K; Cheon JH; Kim S
    BMC Genomics; 2019 Apr; 20(Suppl 2):188. PubMed ID: 30967116
    [TBL] [Abstract][Full Text] [Related]  

  • 23. Information Theoretic Security for Broadcasting of Two Encrypted Sources under Side-Channel Attacks
    Santoso B; Oohama Y
    Entropy (Basel); 2019 Aug; 21(8):. PubMed ID: 33267494
    [TBL] [Abstract][Full Text] [Related]  

  • 24. Logistic regression over encrypted data from fully homomorphic encryption.
    Chen H; Gilad-Bachrach R; Han K; Huang Z; Jalali A; Laine K; Lauter K
    BMC Med Genomics; 2018 Oct; 11(Suppl 4):81. PubMed ID: 30309350
    [TBL] [Abstract][Full Text] [Related]  

  • 25. Traceless encryption approach for physical layer security in coherent optical communications system.
    Zhao ZS; Li PL; Gan WM
    Opt Express; 2023 Apr; 31(8):12585-12596. PubMed ID: 37157415
    [TBL] [Abstract][Full Text] [Related]  

  • 26. Double graph correlation encryption based on hyperchaos.
    Feng L; Du J; Fu C
    PLoS One; 2023; 18(9):e0291759. PubMed ID: 37768960
    [TBL] [Abstract][Full Text] [Related]  

  • 27. Double Image Encryption System Using a Nonlinear Joint Transform Correlator in the Fourier Domain.
    Perez RA; Pérez-Cabré E; Vilardy JM; Millán MS; Torres CO
    Sensors (Basel); 2023 Feb; 23(3):. PubMed ID: 36772681
    [TBL] [Abstract][Full Text] [Related]  

  • 28. Privacy-preserving approximate GWAS computation based on homomorphic encryption.
    Kim D; Son Y; Kim D; Kim A; Hong S; Cheon JH
    BMC Med Genomics; 2020 Jul; 13(Suppl 7):77. PubMed ID: 32693801
    [TBL] [Abstract][Full Text] [Related]  

  • 29. A Novel Homomorphic Approach for Preserving Privacy of Patient Data in Telemedicine.
    Iqbal Y; Tahir S; Tahir H; Khan F; Saeed S; Almuhaideb AM; Syed AM
    Sensors (Basel); 2022 Jun; 22(12):. PubMed ID: 35746213
    [TBL] [Abstract][Full Text] [Related]  

  • 30. Pindex: Private multi-linked index for encrypted document retrieval.
    Prakash AJ; Elizabeth BL
    PLoS One; 2021; 16(8):e0256223. PubMed ID: 34415945
    [TBL] [Abstract][Full Text] [Related]  

  • 31. Attribute-based proxy re-encryption with keyword search.
    Shi Y; Liu J; Han Z; Zheng Q; Zhang R; Qiu S
    PLoS One; 2014; 9(12):e116325. PubMed ID: 25549257
    [TBL] [Abstract][Full Text] [Related]  

  • 32. A flexible and visually meaningful multi-image compression, encryption and hiding scheme based on 2D compressive sensing.
    Huo D; Zhu Z; Zhou X; Wei L; Bai X; Bai Y; Han C
    Heliyon; 2023 Mar; 9(3):e14072. PubMed ID: 36915491
    [No Abstract]   [Full Text] [Related]  

  • 33. Is Homomorphic Encryption-Based Deep Learning Secure Enough?
    Shin J; Choi SH; Choi YH
    Sensors (Basel); 2021 Nov; 21(23):. PubMed ID: 34883809
    [TBL] [Abstract][Full Text] [Related]  

  • 34. Key Aggregation Cryptosystem and Double Encryption Method for Cloud-Based Intelligent Machine Learning Techniques-Based Health Monitoring Systems.
    Almuzaini KK; Sinhal AK; Ranjan R; Goel V; Shrivastava R; Halifa A
    Comput Intell Neurosci; 2022; 2022():3767912. PubMed ID: 35498196
    [TBL] [Abstract][Full Text] [Related]  

  • 35. Deceptive Techniques to Hide a Compressed Video Stream for Information Security.
    Heo J; Jeong J
    Sensors (Basel); 2021 Oct; 21(21):. PubMed ID: 34770505
    [TBL] [Abstract][Full Text] [Related]  

  • 36. [Encryption technique for linkable anonymizing].
    Okamoto E
    Nihon Koshu Eisei Zasshi; 2004 Jun; 51(6):445-51. PubMed ID: 15296025
    [TBL] [Abstract][Full Text] [Related]  

  • 37. Nonlinear Encryption for Multiple Images Based on a Joint Transform Correlator and the Gyrator Transform.
    Perez RA; Vilardy JM; Pérez-Cabré E; Millán MS; Torres CO
    Sensors (Basel); 2023 Feb; 23(3):. PubMed ID: 36772719
    [TBL] [Abstract][Full Text] [Related]  

  • 38. Enhancement of the CAST Block Algorithm Based on Novel S-Box for Image Encryption.
    Ali RS; Akif OZ; Jassim SA; Farhan AK; El-Kenawy EM; Ibrahim A; Ghoneim ME; Abdelhamid AA
    Sensors (Basel); 2022 Nov; 22(21):. PubMed ID: 36366230
    [TBL] [Abstract][Full Text] [Related]  

  • 39. A cloud-based buyer-seller watermarking protocol (CB-BSWP) using semi-trusted third party for copy deterrence and privacy preserving.
    Kumar A
    Multimed Tools Appl; 2022; 81(15):21417-21448. PubMed ID: 35310887
    [TBL] [Abstract][Full Text] [Related]  

  • 40. An ACP-Based Parallel Approach for Color Image Encryption Using Redundant Blocks.
    Zheng W; Yan L; Gou C; Wang FY
    IEEE Trans Cybern; 2022 Dec; 52(12):13181-13196. PubMed ID: 34818199
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 6.