These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

106 related articles for article (PubMed ID: 32182915)

  • 1. Elliptic Curve Cryptography for Wireless Sensor Networks Using the Number Theoretic Transform.
    Gulen U; Baktir S
    Sensors (Basel); 2020 Mar; 20(5):. PubMed ID: 32182915
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Implementing RSA for Wireless Sensor Nodes.
    Gulen U; Alkhodary A; Baktir S
    Sensors (Basel); 2019 Jun; 19(13):. PubMed ID: 31252685
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Energy/Area-Efficient Scalar Multiplication with Binary Edwards Curves for the IoT.
    Lara-Nino CA; Diaz-Perez A; Morales-Sandoval M
    Sensors (Basel); 2019 Feb; 19(3):. PubMed ID: 30744202
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Design of an Elliptic Curve Cryptography processor for RFID tag chips.
    Liu Z; Liu D; Zou X; Lin H; Cheng J
    Sensors (Basel); 2014 Sep; 14(10):17883-904. PubMed ID: 25264952
    [TBL] [Abstract][Full Text] [Related]  

  • 5. FPGA Implementation for Elliptic Curve Cryptography Algorithm and Circuit with High Efficiency and Low Delay for IoT Applications.
    Wang D; Lin Y; Hu J; Zhang C; Zhong Q
    Micromachines (Basel); 2023 May; 14(5):. PubMed ID: 37241660
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Design and Implementation of High-Performance ECC Processor with Unified Point Addition on Twisted Edwards Curve.
    Islam MM; Hossain MS; Hasan MK; Shahjalal M; Jang YM
    Sensors (Basel); 2020 Sep; 20(18):. PubMed ID: 32927594
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Parallel point-multiplication architecture using combined group operations for high-speed cryptographic applications.
    Hossain MS; Saeedi E; Kong Y
    PLoS One; 2017; 12(5):e0176214. PubMed ID: 28459831
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Unified Compact ECC-AES Co-Processor with Group-Key Support for IoT Devices in Wireless Sensor Networks.
    Parrilla L; Castillo E; López-Ramos JA; Álvarez-Bermejo JA; García A; Morales DP
    Sensors (Basel); 2018 Jan; 18(1):. PubMed ID: 29337921
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation.
    Nam J; Choo KK; Han S; Kim M; Paik J; Won D
    PLoS One; 2015; 10(4):e0116709. PubMed ID: 25849359
    [TBL] [Abstract][Full Text] [Related]  

  • 10. iTrust-A Trustworthy and Efficient Mapping Scheme in Elliptic Curve Cryptography.
    Almajed H; Almogren A; Alabdulkareem M
    Sensors (Basel); 2020 Nov; 20(23):. PubMed ID: 33266009
    [TBL] [Abstract][Full Text] [Related]  

  • 11. A New Privacy-Preserving Handover Authentication Scheme for Wireless Networks.
    Wang C; Yuan Y; Wu J
    Sensors (Basel); 2017 Jun; 17(6):. PubMed ID: 28632171
    [TBL] [Abstract][Full Text] [Related]  

  • 12. A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks.
    Chen H; Ge L; Xie L
    Sensors (Basel); 2015 Jul; 15(7):17057-75. PubMed ID: 26184224
    [TBL] [Abstract][Full Text] [Related]  

  • 13. High-Speed and Unified ECC Processor for Generic Weierstrass Curves over GF(
    Awaludin AM; Larasati HT; Kim H
    Sensors (Basel); 2021 Feb; 21(4):. PubMed ID: 33669681
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Secure ECDSA SRAM-PUF Based on Universal Single/Double Scalar Multiplication Architecture.
    Zhang J; Chen Z; He X; Liu K; Hao Y; Ma M; Wang W; Dang H; Li X
    Micromachines (Basel); 2024 Apr; 15(4):. PubMed ID: 38675363
    [TBL] [Abstract][Full Text] [Related]  

  • 15. A Multi-Server Two-Factor Authentication Scheme with Un-Traceability Using Elliptic Curve Cryptography.
    Xu G; Qiu S; Ahmad H; Xu G; Guo Y; Zhang M; Xu H
    Sensors (Basel); 2018 Jul; 18(7):. PubMed ID: 30041475
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Fixed-base comb with window-non-adjacent form (NAF) method for scalar multiplication.
    Seo H; Kim H; Park T; Lee Y; Liu Z; Kim H
    Sensors (Basel); 2013 Jul; 13(7):9483-512. PubMed ID: 23881143
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Public Key-Based Authentication and En-Route Filtering Scheme in Wireless Sensor Networks.
    Yi C; Yang G; Dai H; Liu L; Li N
    Sensors (Basel); 2018 Nov; 18(11):. PubMed ID: 30413068
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Armed with Faster Crypto: Optimizing Elliptic Curve Cryptography for ARM Processors.
    De Smet R; Blancquaert R; Godden T; Steenhaut K; Braeken A
    Sensors (Basel); 2024 Feb; 24(3):. PubMed ID: 38339747
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Constructing Pairing-Friendly Elliptic Curves under Embedding Degree 1 for Securing Critical Infrastructures.
    Wang M; Dai G; Choo KK; Jayaraman PP; Ranjan R
    PLoS One; 2016; 11(8):e0161857. PubMed ID: 27564373
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Design and implementation of a secure wireless mote-based medical sensor network.
    Malasri K; Wang L
    Sensors (Basel); 2009; 9(8):6273-97. PubMed ID: 22454585
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 6.