These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

192 related articles for article (PubMed ID: 33267183)

  • 1. Information Theoretic Security for Shannon Cipher System under Side-Channel Attacks
    Santoso B; Oohama Y
    Entropy (Basel); 2019 May; 21(5):. PubMed ID: 33267183
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Information Theoretic Security for Broadcasting of Two Encrypted Sources under Side-Channel Attacks
    Santoso B; Oohama Y
    Entropy (Basel); 2019 Aug; 21(8):. PubMed ID: 33267494
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Exponential Strong Converse for One Helper Source Coding Problem.
    Oohama Y
    Entropy (Basel); 2019 Jun; 21(6):. PubMed ID: 33267281
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Physical-layer security analysis of a quantum-noise randomized cipher based on the wire-tap channel model.
    Jiao H; Pu T; Zheng J; Xiang P; Fang T
    Opt Express; 2017 May; 25(10):10947-10960. PubMed ID: 28788782
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Exponential Strong Converse for Source Coding with Side Information at the Decoder.
    Oohama Y
    Entropy (Basel); 2018 May; 20(5):. PubMed ID: 33265442
    [TBL] [Abstract][Full Text] [Related]  

  • 6. A flexible and visually meaningful multi-image compression, encryption and hiding scheme based on 2D compressive sensing.
    Huo D; Zhu Z; Zhou X; Wei L; Bai X; Bai Y; Han C
    Heliyon; 2023 Mar; 9(3):e14072. PubMed ID: 36915491
    [No Abstract]   [Full Text] [Related]  

  • 7. Backward Compatible Identity-Based Encryption.
    Kim J
    Sensors (Basel); 2023 Apr; 23(9):. PubMed ID: 37177384
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Secure Polar Coding for the Primitive Relay Wiretap Channel.
    Athanasakos M; Karagiannidis G
    Entropy (Basel); 2021 Apr; 23(4):. PubMed ID: 33918817
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Private Key and Decoder Side Information for Secure and Private Source Coding.
    Günlü O; Schaefer RF; Boche H; Poor HV
    Entropy (Basel); 2022 Nov; 24(12):. PubMed ID: 36554121
    [TBL] [Abstract][Full Text] [Related]  

  • 10. An Effective Simulation Analysis of Transient Electromagnetic Multiple Faults.
    Dong L; Zhang H; Sun S; Zhu L; Cui X; Ghosh BK
    Sensors (Basel); 2020 Apr; 20(7):. PubMed ID: 32244774
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Exponential Strong Converse for Successive Refinement with Causal Decoder Side Information.
    Zhou L; Hero A
    Entropy (Basel); 2019 Apr; 21(4):. PubMed ID: 33267124
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Encoding Individual Source Sequences for the Wiretap Channel.
    Merhav N
    Entropy (Basel); 2021 Dec; 23(12):. PubMed ID: 34946000
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Unconditionally Secure Ciphers with a Short Key for a Source with Unknown Statistics.
    Ryabko B
    Entropy (Basel); 2023 Sep; 25(10):. PubMed ID: 37895527
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Measurement-device-independent quantum communication without encryption.
    Niu PH; Zhou ZR; Lin ZS; Sheng YB; Yin LG; Long GL
    Sci Bull (Beijing); 2018 Oct; 63(20):1345-1350. PubMed ID: 36658905
    [TBL] [Abstract][Full Text] [Related]  

  • 15. (Inner-Product) Functional Encryption with Updatable Ciphertexts.
    Cini V; Ramacher S; Slamanig D; Striecks C; Tairi E
    J Cryptol; 2024; 37(1):8. PubMed ID: 38274003
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Shifted LT Code Security Scheme for Partial Information Encryption.
    Zhang S; Niu F; Wang L; Yu L
    Entropy (Basel); 2022 Dec; 24(12):. PubMed ID: 36554181
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Implications of Coding Layers on Physical-Layer Security: A Secrecy Benefit Approach.
    Harrison WK; Beard E; Dye S; Holmes E; Nelson K; Gomes MAC; Vilela JP
    Entropy (Basel); 2019 Aug; 21(8):. PubMed ID: 33267469
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Attribute-based encryption scheme with multi-keyword search and supporting attribute revocation in cloud storage.
    Wang S; Yao L; Zhang Y
    PLoS One; 2018; 13(10):e0205675. PubMed ID: 30312345
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Graph Layer Security: Encrypting Information via Common Networked Physics.
    Wei Z; Wang L; Sun SC; Li B; Guo W
    Sensors (Basel); 2022 May; 22(10):. PubMed ID: 35632362
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Breaking Trivium Stream Cipher Implemented in ASIC Using Experimental Attacks and DFA.
    Potestad-Ordóñez FE; Valencia-Barrero M; Baena-Oliva C; Parra-Fernández P; Jiménez-Fernández CJ
    Sensors (Basel); 2020 Dec; 20(23):. PubMed ID: 33287234
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 10.