BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

526 related articles for article (PubMed ID: 34372360)

  • 1. Machine Learning for Authentication and Authorization in IoT: Taxonomy, Challenges and Future Research Direction.
    Istiaque Ahmed K; Tahir M; Hadi Habaebi M; Lun Lau S; Ahad A
    Sensors (Basel); 2021 Jul; 21(15):. PubMed ID: 34372360
    [TBL] [Abstract][Full Text] [Related]  

  • 2. A Comparative Analysis on Blockchain versus Centralized Authentication Architectures for IoT-Enabled Smart Devices in Smart Cities: A Comprehensive Review, Recent Advances, and Future Research Directions.
    Khalil U; Malik OA; Uddin M; Chen CL
    Sensors (Basel); 2022 Jul; 22(14):. PubMed ID: 35890848
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Hyperledger Fabric Blockchain for Securing the Edge Internet of Things.
    Honar Pajooh H; Rashid M; Alam F; Demidenko S
    Sensors (Basel); 2021 Jan; 21(2):. PubMed ID: 33430274
    [TBL] [Abstract][Full Text] [Related]  

  • 4. A secure remote user authentication scheme for 6LoWPAN-based Internet of Things.
    Abbas G; Tanveer M; Abbas ZH; Waqas M; Baker T; Al-Jumeily Obe D
    PLoS One; 2021; 16(11):e0258279. PubMed ID: 34748568
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Blockchain-Based Authentication and Trust Management Mechanism for Smart Cities.
    Asif M; Aziz Z; Bin Ahmad M; Khalid A; Waris HA; Gilani A
    Sensors (Basel); 2022 Mar; 22(7):. PubMed ID: 35408219
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Secure Authentication and Credential Establishment in Narrowband IoT and 5G.
    Sanchez-Gomez J; Garcia-Carrillo D; Marin-Perez R; Skarmeta AF
    Sensors (Basel); 2020 Feb; 20(3):. PubMed ID: 32045992
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Blockchain-Based Context-Aware Authorization Management as a Service in IoT.
    Sylla T; Mendiboure L; Chalouf MA; Krief F
    Sensors (Basel); 2021 Nov; 21(22):. PubMed ID: 34833732
    [TBL] [Abstract][Full Text] [Related]  

  • 8. LDAKM-EIoT: Lightweight Device Authentication and Key Management Mechanism for Edge-Based IoT Deployment.
    Wazid M; Das AK; Shetty S; J P C Rodrigues J; Park Y
    Sensors (Basel); 2019 Dec; 19(24):. PubMed ID: 31847431
    [TBL] [Abstract][Full Text] [Related]  

  • 9. A Survey of IoT Security Based on a Layered Architecture of Sensing and Data Analysis.
    Mrabet H; Belguith S; Alhomoud A; Jemai A
    Sensors (Basel); 2020 Jun; 20(13):. PubMed ID: 32605178
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Hash-Chain Fog/Edge: A Mode-Based Hash-Chain for Secured Mutual Authentication Protocol Using Zero-Knowledge Proofs in Fog/Edge.
    Pardeshi MS; Sheu RK; Yuan SM
    Sensors (Basel); 2022 Jan; 22(2):. PubMed ID: 35062563
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Blockchain-Based Secure Authentication with Improved Performance for Fog Computing.
    Umoren O; Singh R; Awan S; Pervez Z; Dahal K
    Sensors (Basel); 2022 Nov; 22(22):. PubMed ID: 36433564
    [TBL] [Abstract][Full Text] [Related]  

  • 12. The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey.
    Tariq N; Asim M; Al-Obeidat F; Zubair Farooqi M; Baker T; Hammoudeh M; Ghafir I
    Sensors (Basel); 2019 Apr; 19(8):. PubMed ID: 31013993
    [TBL] [Abstract][Full Text] [Related]  

  • 13. A Comprehensive Study of Anomaly Detection Schemes in IoT Networks Using Machine Learning Algorithms.
    Diro A; Chilamkurti N; Nguyen VD; Heyne W
    Sensors (Basel); 2021 Dec; 21(24):. PubMed ID: 34960414
    [TBL] [Abstract][Full Text] [Related]  

  • 14. DIdM-EIoTD: Distributed Identity Management for Edge Internet of Things (IoT) Devices.
    Sadique KM; Rahmani R; Johannesson P
    Sensors (Basel); 2023 Apr; 23(8):. PubMed ID: 37112389
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Multi-Layer Blockchain-Based Security Architecture for Internet of Things.
    Honar Pajooh H; Rashid M; Alam F; Demidenko S
    Sensors (Basel); 2021 Jan; 21(3):. PubMed ID: 33498860
    [TBL] [Abstract][Full Text] [Related]  

  • 16. IMSC-EIoTD: Identity Management and Secure Communication for Edge IoT Devices.
    Sadique KM; Rahmani R; Johannesson P
    Sensors (Basel); 2020 Nov; 20(22):. PubMed ID: 33207820
    [TBL] [Abstract][Full Text] [Related]  

  • 17. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks.
    Kim KW; Han YH; Min SG
    Sensors (Basel); 2017 Sep; 17(10):. PubMed ID: 28934152
    [TBL] [Abstract][Full Text] [Related]  

  • 18. A Lightweight Authentication and Key Agreement Schemes for IoT Environments.
    Lee DH; Lee IY
    Sensors (Basel); 2020 Sep; 20(18):. PubMed ID: 32961979
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Exploring security threats and solutions Techniques for Internet of Things (IoT): from vulnerabilities to vigilance.
    Sahu SK; Mazumdar K
    Front Artif Intell; 2024; 7():1397480. PubMed ID: 38845684
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Security at the Edge for Resource-Limited IoT Devices.
    Canavese D; Mannella L; Regano L; Basile C
    Sensors (Basel); 2024 Jan; 24(2):. PubMed ID: 38257680
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 27.