These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

132 related articles for article (PubMed ID: 33378935)

  • 1. Novel efficient lattice-based IBE schemes with CPK for fog computing.
    Shi Y; Qiu S; Liu J; Ma T
    Math Biosci Eng; 2020 Nov; 17(6):8105-8122. PubMed ID: 33378935
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Adaptively Secure Efficient (H)IBE over Ideal Lattice with Short Parameters.
    Zhang Y; Liu Y; Guo Y; Zheng S; Wang L
    Entropy (Basel); 2020 Nov; 22(11):. PubMed ID: 33287014
    [TBL] [Abstract][Full Text] [Related]  

  • 3. A Lattice-Based Homomorphic Proxy Re-Encryption Scheme with Strong Anti-Collusion for Cloud Computing.
    Li J; Qiao Z; Zhang K; Cui C
    Sensors (Basel); 2021 Jan; 21(1):. PubMed ID: 33406662
    [TBL] [Abstract][Full Text] [Related]  

  • 4. A Provably Secure IBE Transformation Model for PKC Using Conformable Chebyshev Chaotic Maps under Human-Centered IoT Environments.
    Meshram C; Imoize AL; Aljaedi A; Alharbi AR; Jamal SS; Barve SK
    Sensors (Basel); 2021 Oct; 21(21):. PubMed ID: 34770535
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Post-Quantum Secure Identity-Based Proxy Blind Signature Scheme on a Lattice.
    Li F; Yang M; Song Z; Wang P; Li G
    Entropy (Basel); 2023 Aug; 25(8):. PubMed ID: 37628187
    [TBL] [Abstract][Full Text] [Related]  

  • 6. New Constructions of Identity-Based Dual Receiver Encryption from Lattices.
    Liu Y; Wang L; Shen X; Li L
    Entropy (Basel); 2020 May; 22(6):. PubMed ID: 33286371
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Backward Compatible Identity-Based Encryption.
    Kim J
    Sensors (Basel); 2023 Apr; 23(9):. PubMed ID: 37177384
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Research on Quantum-Attack-Resistant Strong Forward-Secure Signature Schemes.
    Li F; Wang J; Shang M; Zhang D; Li T
    Entropy (Basel); 2023 Aug; 25(8):. PubMed ID: 37628189
    [TBL] [Abstract][Full Text] [Related]  

  • 9. An Improved ID-Based Data Storage Scheme for Fog-Enabled IoT Environments.
    Lin HY; Tsai TT; Ting PY; Chen CC
    Sensors (Basel); 2022 Jun; 22(11):. PubMed ID: 35684844
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation.
    Xu Q; Tan C; Fan Z; Zhu W; Xiao Y; Cheng F
    Sensors (Basel); 2018 May; 18(5):. PubMed ID: 29772840
    [TBL] [Abstract][Full Text] [Related]  

  • 11. A Blockchain Copyright Protection Scheme Based on CP-ABE Scheme with Policy Update.
    Jiang J; Gao Y; Gong Y; Jiang Z
    Sensors (Basel); 2024 Jul; 24(14):. PubMed ID: 39065891
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Identity-Based Proxy Re-Encryption Scheme Using Fog Computing and Anonymous Key Generation.
    Lin HY; Tsai TT; Ting PY; Fan YR
    Sensors (Basel); 2023 Mar; 23(5):. PubMed ID: 36904909
    [TBL] [Abstract][Full Text] [Related]  

  • 13. A generic construction for revocable identity-based encryption with subset difference methods.
    Lee K
    PLoS One; 2020; 15(9):e0239053. PubMed ID: 32946491
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Efficient Equality Test on Identity-Based Ciphertexts Supporting Flexible Authorization.
    Li N
    Entropy (Basel); 2023 Feb; 25(2):. PubMed ID: 36832728
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Traceable Scheme of Public Key Encryption with Equality Test.
    Zhu H; Xue Q; Li T; Xie D
    Entropy (Basel); 2022 Feb; 24(3):. PubMed ID: 35327820
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Revocable and Fog-Enabled Proxy Re-Encryption Scheme for IoT Environments.
    Lin HY; Chen PR
    Sensors (Basel); 2024 Sep; 24(19):. PubMed ID: 39409330
    [TBL] [Abstract][Full Text] [Related]  

  • 17. An Aggregate Signature Scheme Based on a Trapdoor Hash Function for the Internet of Things.
    Shu H; Chen F; Xie D; Sun L; Qi P; Huang Y
    Sensors (Basel); 2019 Sep; 19(19):. PubMed ID: 31569570
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Quantum Misuse Attack on Frodo.
    Wang Y; Jiang H; Ma Z
    Entropy (Basel); 2022 Oct; 24(10):. PubMed ID: 37420438
    [TBL] [Abstract][Full Text] [Related]  

  • 19. A Hybrid Scheme for Fine-Grained Search and Access Authorization in Fog Computing Environment.
    Xiao M; Zhou J; Liu X; Jiang M
    Sensors (Basel); 2017 Jun; 17(6):. PubMed ID: 28629131
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Identity-Based Proxy Signature with Message Recovery over NTRU Lattice.
    Wu F; Zhou B; Zhang X
    Entropy (Basel); 2023 Mar; 25(3):. PubMed ID: 36981342
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 7.