These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

144 related articles for article (PubMed ID: 33471849)

  • 1. One-time-pad cipher algorithm based on confusion mapping and DNA storage technology.
    Peng W; Cui S; Song C
    PLoS One; 2021; 16(1):e0245506. PubMed ID: 33471849
    [TBL] [Abstract][Full Text] [Related]  

  • 2. One-time-pad cryptography scheme based on a three-dimensional DNA self-assembly pyramid structure.
    Peng W; Cheng D; Song C
    PLoS One; 2018; 13(11):e0206612. PubMed ID: 30399178
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Image Encryption Algorithm Based on Hyperchaotic Maps and Nucleotide Sequences Database.
    Niu Y; Zhang X; Han F
    Comput Intell Neurosci; 2017; 2017():4079793. PubMed ID: 28392799
    [TBL] [Abstract][Full Text] [Related]  

  • 4. A double encryption protection algorithm for stem cell bank privacy data based on improved AES and chaotic encryption technology.
    Wang L; Wei X; Zhang Y; Gao Y; Niu Q
    PLoS One; 2023; 18(10):e0293418. PubMed ID: 37878640
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Encryption method and security analysis of medical images based on stream cipher enhanced logical mapping.
    Liu S; Liu L; Pang M
    Technol Health Care; 2021; 29(S1):185-193. PubMed ID: 33682758
    [TBL] [Abstract][Full Text] [Related]  

  • 6. BRISK: Dynamic Encryption Based Cipher for Long Term Security.
    Dwivedi AD
    Sensors (Basel); 2021 Aug; 21(17):. PubMed ID: 34502635
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Image Encryption Algorithm Based on an Improved ML Neuron Model and DNA Dynamic Coding.
    Cao Y; Shi P; Wu K; Li W
    Comput Intell Neurosci; 2022; 2022():4316163. PubMed ID: 35607463
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Color image encryption scheme using CML and DNA sequence operations.
    Wang XY; Zhang HL; Bao XM
    Biosystems; 2016 Jun; 144():18-26. PubMed ID: 27026385
    [TBL] [Abstract][Full Text] [Related]  

  • 9. A secured cryptographic system based on DNA and a hybrid key generation approach.
    Indrasena Reddy M; Siva Kumar AP; Subba Reddy K
    Biosystems; 2020 Nov; 197():104207. PubMed ID: 32653339
    [TBL] [Abstract][Full Text] [Related]  

  • 10. DNA based random key generation and management for OTP encryption.
    Zhang Y; Liu X; Sun M
    Biosystems; 2017 Sep; 159():51-63. PubMed ID: 28733249
    [TBL] [Abstract][Full Text] [Related]  

  • 11. DNA Cryptography and Deep Learning using Genetic Algorithm with NW algorithm for Key Generation.
    Kalsi S; Kaur H; Chang V
    J Med Syst; 2017 Dec; 42(1):17. PubMed ID: 29204890
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Comment on "Encryption and decryption of images with chaotic map lattices" [Chaos 16, 033118 (2006)].
    Solak E; Cokal C
    Chaos; 2008 Sep; 18(3):038101. PubMed ID: 19045506
    [TBL] [Abstract][Full Text] [Related]  

  • 13. An Image Compression Encryption Algorithm Based on Chaos and ZUC Stream Cipher.
    Song X; Shi M; Zhou Y; Wang E
    Entropy (Basel); 2022 May; 24(5):. PubMed ID: 35626625
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Symmetric-Key Encryption Based on Bioaffinity Interactions.
    McGoldrick LK; Weiss EA; Halámek J
    ACS Synth Biol; 2019 Jul; 8(7):1655-1662. PubMed ID: 31287664
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Double images encryption method with resistance against the specific attack based on an asymmetric algorithm.
    Wang X; Zhao D
    Opt Express; 2012 May; 20(11):11994-2003. PubMed ID: 22714185
    [TBL] [Abstract][Full Text] [Related]  

  • 16. An image encryption algorithm utilizing julia sets and hilbert curves.
    Sun Y; Chen L; Xu R; Kong R
    PLoS One; 2014; 9(1):e84655. PubMed ID: 24404181
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Image Encryption Algorithm Based on the H-Fractal and Dynamic Self-Invertible Matrix.
    Zhang X; Wang L; Niu Y; Cui G; Geng S
    Comput Intell Neurosci; 2019; 2019():9524080. PubMed ID: 31312215
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Known plaintext attack on double random phase encoding using fingerprint as key and a method for avoiding the attack.
    Tashima H; Takeda M; Suzuki H; Obi T; Yamaguchi M; Ohyama N
    Opt Express; 2010 Jun; 18(13):13772-81. PubMed ID: 20588510
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Security Analysis and Improvement of an Image Encryption Cryptosystem Based on Bit Plane Extraction and Multi Chaos.
    Zhu S; Zhu C
    Entropy (Basel); 2021 Apr; 23(5):. PubMed ID: 33922307
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Multiuser communication scheme based on binary phase-shift keying and chaos for telemedicine.
    Michel-Macarty JA; Murillo-Escobar MA; López-Gutiérrez RM; Cruz-Hernández C; Cardoza-Avendaño L
    Comput Methods Programs Biomed; 2018 Aug; 162():165-175. PubMed ID: 29903483
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 8.