These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

112 related articles for article (PubMed ID: 33042580)

  • 1. "Passwords protect my stuff"-a study of children's password practices.
    Choong YY; Theofanos MF; Renaud K; Prior S
    J Cybersecur; 2019; 5(1):. PubMed ID: 33042580
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Individual differences in cyber security behaviors: an examination of who is sharing passwords.
    Whitty M; Doodson J; Creese S; Hodges D
    Cyberpsychol Behav Soc Netw; 2015 Jan; 18(1):3-7. PubMed ID: 25517697
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Recurrent GANs Password Cracker For IoT Password Security Enhancement.
    Nam S; Jeon S; Kim H; Moon J
    Sensors (Basel); 2020 May; 20(11):. PubMed ID: 32486361
    [TBL] [Abstract][Full Text] [Related]  

  • 4. LPG-PCFG: An Improved Probabilistic Context- Free Grammar to Hit Low-Probability Passwords.
    Guo X; Tan K; Liu Y; Jin M; Lu H
    Sensors (Basel); 2022 Jun; 22(12):. PubMed ID: 35746386
    [TBL] [Abstract][Full Text] [Related]  

  • 5. How strong are passwords used to protect personal health information in clinical trials?
    El Emam K; Moreau K; Jonker E
    J Med Internet Res; 2011 Feb; 13(1):e18. PubMed ID: 21317106
    [TBL] [Abstract][Full Text] [Related]  

  • 6. How secure is your information system? An investigation into actual healthcare worker password practices.
    Cazier JA; Medlin BD
    Perspect Health Inf Manag; 2006 Sep; 3():8. PubMed ID: 18066366
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Improving computer security for authentication of users: influence of proactive password restrictions.
    Proctor RW; Lien MC; Vu KP; Schultz EE; Salvendy G
    Behav Res Methods Instrum Comput; 2002 May; 34(2):163-9. PubMed ID: 12109007
    [TBL] [Abstract][Full Text] [Related]  

  • 8. A Password Meter without Password Exposure.
    Kim P; Lee Y; Hong YS; Kwon T
    Sensors (Basel); 2021 Jan; 21(2):. PubMed ID: 33419094
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Passwords usage and human memory limitations: a survey across age and educational background.
    Pilar DR; Jaeger A; Gomes CF; Stein LM
    PLoS One; 2012; 7(12):e51067. PubMed ID: 23227232
    [TBL] [Abstract][Full Text] [Related]  

  • 10. The impact of financial deprivation on children's cybersecurity knowledge & abilities.
    Prior S; Renaud K
    Educ Inf Technol (Dordr); 2022; 27(8):10563-10583. PubMed ID: 35464112
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Detection of DIAG and LINE Patterns in PassPoints Graphical Passwords Based on the Maximum Angles of Their Delaunay Triangles.
    Suárez-Plasencia L; Herrera-Macías JA; Legón-Pérez CM; Sosa-Gómez G; Rojas O
    Sensors (Basel); 2022 Mar; 22(5):. PubMed ID: 35271135
    [TBL] [Abstract][Full Text] [Related]  

  • 12. People infuse their passwords with autobiographical information.
    Taylor RJ; Garry M
    Memory; 2019 May; 27(5):581-591. PubMed ID: 30373450
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Cognitive CAPTCHA Password Reminder.
    Krzyworzeka N; Ogiela L; Ogiela MR
    Sensors (Basel); 2023 Mar; 23(6):. PubMed ID: 36991880
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Security analysis and improvements to the PsychoPass method.
    Brumen B; Heričko M; Rozman I; Hölbl M
    J Med Internet Res; 2013 Aug; 15(8):e161. PubMed ID: 23942458
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Cytocoded passwords: BioMEMS based barcoding of biological samples for user authentication in microfluidic diagnostic devices.
    Salles-Loustau G; Le T; Najafizadeh L; Zonouz S; Javanmard M
    Biomed Microdevices; 2018 Jul; 20(3):63. PubMed ID: 30066033
    [TBL] [Abstract][Full Text] [Related]  

  • 16. School-based interventions to promote personal and environmental hygiene practices among children in Pakistan: protocol for a mixed methods study.
    Pradhan NA; Mughis W; Ali TS; Naseem M; Karmaliani R
    BMC Public Health; 2020 Apr; 20(1):481. PubMed ID: 32290822
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Integrating Visual Mnemonics and Input Feedback With Passphrases to Improve the Usability and Security of Digital Authentication.
    Juang K; Greenstein J
    Hum Factors; 2018 Aug; 60(5):658-668. PubMed ID: 29718722
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Prevalence of Sharing Access Credentials in Electronic Medical Records.
    Hassidim A; Korach T; Shreberk-Hassidim R; Thomaidou E; Uzefovsky F; Ayal S; Ariely D
    Healthc Inform Res; 2017 Jul; 23(3):176-182. PubMed ID: 28875052
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Family pediatrics: report of the Task Force on the Family.
    Schor EL;
    Pediatrics; 2003 Jun; 111(6 Pt 2):1541-71. PubMed ID: 12777595
    [TBL] [Abstract][Full Text] [Related]  

  • 20. [Application of password manager software in health care].
    Ködmön J
    Orv Hetil; 2016 Dec; 157(52):2066-2073. PubMed ID: 28019111
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 6.