These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

108 related articles for article (PubMed ID: 33120521)

  • 1. XML security protection scheme based on Kerberos authentication and polynomials authorization.
    Guo LH; Wang J; Wu HT; Al-Nabhan N
    Math Biosci Eng; 2020 Jul; 17(5):4609-4630. PubMed ID: 33120521
    [TBL] [Abstract][Full Text] [Related]  

  • 2. A Blockchain-Based Authentication and Authorization Scheme for Distributed Mobile Cloud Computing Services.
    Yu L; He M; Liang H; Xiong L; Liu Y
    Sensors (Basel); 2023 Jan; 23(3):. PubMed ID: 36772304
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Secure anonymity-preserving password-based user authentication and session key agreement scheme for telecare medicine information systems.
    Sutrala AK; Das AK; Odelu V; Wazid M; Kumari S
    Comput Methods Programs Biomed; 2016 Oct; 135():167-85. PubMed ID: 27586489
    [TBL] [Abstract][Full Text] [Related]  

  • 4. An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System.
    Li CT; Wu TY; Chen CL; Lee CC; Chen CM
    Sensors (Basel); 2017 Jun; 17(7):. PubMed ID: 28644381
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Secure and Efficient Two-Factor User Authentication Scheme with User Anonymity for Network Based E-Health Care Applications.
    Li X; Niu J; Karuppiah M; Kumari S; Wu F
    J Med Syst; 2016 Dec; 40(12):268. PubMed ID: 27734256
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Application of IoT Authentication Key Management Algorithm to Personnel Information Management.
    Wang Q; Li H
    Comput Intell Neurosci; 2022; 2022():4584072. PubMed ID: 35498183
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Access Control Based on Ciphertext Attribute Authentication and Threshold Policy for the Internet of Things.
    Zhang Q; Li Y; Li Z; Yuan J; Gan Y; Luo X
    Sensors (Basel); 2019 Nov; 19(23):. PubMed ID: 31795236
    [TBL] [Abstract][Full Text] [Related]  

  • 8. A Secure Lightweight Three-Factor Authentication Scheme for IoT in Cloud Computing Environment.
    Yu S; Park K; Park Y
    Sensors (Basel); 2019 Aug; 19(16):. PubMed ID: 31430911
    [TBL] [Abstract][Full Text] [Related]  

  • 9. The Integrated Holistic Security and Privacy Framework Deployed in CrowdHEALTH Project.
    Malliaros S; Xenakis C; Moldovan G; Mantas J; Magdalinou A; Montandon L
    Acta Inform Med; 2019 Dec; 27(5):333-340. PubMed ID: 32210501
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Machine Learning for Authentication and Authorization in IoT: Taxonomy, Challenges and Future Research Direction.
    Istiaque Ahmed K; Tahir M; Hadi Habaebi M; Lun Lau S; Ahad A
    Sensors (Basel); 2021 Jul; 21(15):. PubMed ID: 34372360
    [TBL] [Abstract][Full Text] [Related]  

  • 11. VisTAS: blockchain-based visible and trusted remote authentication system.
    Ali A; Ahmed M; Khan A; Anjum A; Ilyas M; Helfert M
    PeerJ Comput Sci; 2021; 7():e516. PubMed ID: 34084926
    [TBL] [Abstract][Full Text] [Related]  

  • 12. A digital memories based user authentication scheme with privacy preservation.
    Liu J; Lyu Q; Wang Q; Yu X
    PLoS One; 2017; 12(11):e0186925. PubMed ID: 29190659
    [TBL] [Abstract][Full Text] [Related]  

  • 13. A Secure Dynamic Identity and Chaotic Maps Based User Authentication and Key Agreement Scheme for e-Healthcare Systems.
    Li CT; Lee CC; Weng CY; Chen SJ
    J Med Syst; 2016 Nov; 40(11):233. PubMed ID: 27653040
    [TBL] [Abstract][Full Text] [Related]  

  • 14. An improved three-factor authentication scheme for patient monitoring using WSN in remote health-care system.
    Soni P; Pal AK; Islam SH
    Comput Methods Programs Biomed; 2019 Dec; 182():105054. PubMed ID: 31499422
    [TBL] [Abstract][Full Text] [Related]  

  • 15. A secure heterogeneous mobile authentication and key agreement scheme for e-healthcare cloud systems.
    Lin HY
    PLoS One; 2018; 13(12):e0208397. PubMed ID: 30540838
    [TBL] [Abstract][Full Text] [Related]  

  • 16. A Secure User Anonymity and Authentication Scheme Using AVISPA for Telecare Medical Information Systems.
    Mir O; van der Weide T; Lee CC
    J Med Syst; 2015 Sep; 39(9):89. PubMed ID: 26242748
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Design of a Secure Medical Data Sharing Scheme Based on Blockchain.
    Cheng X; Chen F; Xie D; Sun H; Huang C
    J Med Syst; 2020 Jan; 44(2):52. PubMed ID: 31915982
    [TBL] [Abstract][Full Text] [Related]  

  • 18. OpenID Connect as a security service in cloud-based medical imaging systems.
    Ma W; Sartipi K; Sharghigoorabi H; Koff D; Bak P
    J Med Imaging (Bellingham); 2016 Apr; 3(2):026501. PubMed ID: 27340682
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Security enhanced multi-factor biometric authentication scheme using bio-hash function.
    Choi Y; Lee Y; Moon J; Won D
    PLoS One; 2017; 12(5):e0176250. PubMed ID: 28459867
    [TBL] [Abstract][Full Text] [Related]  

  • 20. An Authentication Protocol for Future Sensor Networks.
    Bilal M; Kang SG
    Sensors (Basel); 2017 Apr; 17(5):. PubMed ID: 28452937
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 6.