BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

241 related articles for article (PubMed ID: 34401472)

  • 1. Secure biometric authentication with de-duplication on distributed cloud storage.
    M VK; Venkatachalam K; P P; Almutairi A; Abouhawwash M
    PeerJ Comput Sci; 2021; 7():e569. PubMed ID: 34401472
    [TBL] [Abstract][Full Text] [Related]  

  • 2. A Secure Lightweight Three-Factor Authentication Scheme for IoT in Cloud Computing Environment.
    Yu S; Park K; Park Y
    Sensors (Basel); 2019 Aug; 19(16):. PubMed ID: 31430911
    [TBL] [Abstract][Full Text] [Related]  

  • 3. LDAKM-EIoT: Lightweight Device Authentication and Key Management Mechanism for Edge-Based IoT Deployment.
    Wazid M; Das AK; Shetty S; J P C Rodrigues J; Park Y
    Sensors (Basel); 2019 Dec; 19(24):. PubMed ID: 31847431
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Provably Secure Lightweight Mutual Authentication and Key Agreement Scheme for Cloud-Based IoT Environments.
    Ju S; Park Y
    Sensors (Basel); 2023 Dec; 23(24):. PubMed ID: 38139612
    [TBL] [Abstract][Full Text] [Related]  

  • 5. A Blockchain-Based Authentication and Authorization Scheme for Distributed Mobile Cloud Computing Services.
    Yu L; He M; Liang H; Xiong L; Liu Y
    Sensors (Basel); 2023 Jan; 23(3):. PubMed ID: 36772304
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Multi-sensor network tracking research utilizing searchable encryption algorithm in the cloud computing environment.
    Sun X; Li S
    PeerJ Comput Sci; 2023; 9():e1433. PubMed ID: 37409083
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Enabling secure mutual authentication and storage checking in cloud-assisted IoT.
    Liu D; Li Z; Wang C; Ren Y
    Math Biosci Eng; 2022 Aug; 19(11):11034-11046. PubMed ID: 36124579
    [TBL] [Abstract][Full Text] [Related]  

  • 8. A Smart Biometric Identity Management Framework for Personalised IoT and Cloud Computing-Based Healthcare Services.
    Farid F; Elkhodr M; Sabrina F; Ahamed F; Gide E
    Sensors (Basel); 2021 Jan; 21(2):. PubMed ID: 33466730
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Online/Offline MA-CP-ABE with Cryptographic Reverse Firewalls for IoT.
    Li J; Fan Y; Bian X; Yuan Q
    Entropy (Basel); 2023 Apr; 25(4):. PubMed ID: 37190404
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Security analysis and secure channel-free certificateless searchable public key authenticated encryption for a cloud-based Internet of things.
    Wu B; Wang C; Yao H
    PLoS One; 2020; 15(4):e0230722. PubMed ID: 32271788
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Efficient and Secure Privacy Analysis for Medical Big Data Using TDES and MKSVM with Access Control in Cloud.
    Shanmugapriya E; Kavitha R
    J Med Syst; 2019 Jul; 43(8):265. PubMed ID: 31273467
    [TBL] [Abstract][Full Text] [Related]  

  • 12. An Elliptic Curve Based Schnorr Cloud Security Model in Distributed Environment.
    Muthurajan V; Narayanasamy B
    ScientificWorldJournal; 2016; 2016():4913015. PubMed ID: 26981584
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Centralized Duplicate Removal Video Storage System with Privacy Preservation in IoT.
    Yan H; Li X; Wang Y; Jia C
    Sensors (Basel); 2018 Jun; 18(6):. PubMed ID: 29867037
    [TBL] [Abstract][Full Text] [Related]  

  • 14. A Secure and Lightweight Fine-Grained Data Sharing Scheme for Mobile Cloud Computing.
    Li H; Lan C; Fu X; Wang C; Li F; Guo H
    Sensors (Basel); 2020 Aug; 20(17):. PubMed ID: 32825602
    [TBL] [Abstract][Full Text] [Related]  

  • 15. VisTAS: blockchain-based visible and trusted remote authentication system.
    Ali A; Ahmed M; Khan A; Anjum A; Ilyas M; Helfert M
    PeerJ Comput Sci; 2021; 7():e516. PubMed ID: 34084926
    [TBL] [Abstract][Full Text] [Related]  

  • 16. An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System.
    Li CT; Wu TY; Chen CL; Lee CC; Chen CM
    Sensors (Basel); 2017 Jun; 17(7):. PubMed ID: 28644381
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Identity-based controlled delegated outsourcing data integrity auditing scheme.
    Du J; Dong G; Ning J; Xu Z; Yang R
    Sci Rep; 2024 Mar; 14(1):7582. PubMed ID: 38555378
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Microservice Security Agent Based On API Gateway in Edge Computing.
    Xu R; Jin W; Kim D
    Sensors (Basel); 2019 Nov; 19(22):. PubMed ID: 31717617
    [TBL] [Abstract][Full Text] [Related]  

  • 19. A searchable personal health records framework with fine-grained access control in cloud-fog computing.
    Sun J; Wang X; Wang S; Ren L
    PLoS One; 2018; 13(11):e0207543. PubMed ID: 30496194
    [TBL] [Abstract][Full Text] [Related]  

  • 20. A New Secure Model for Data Protection over Cloud Computing.
    Sauber AM; El-Kafrawy PM; Shawish AF; Amin MA; Hagag IM
    Comput Intell Neurosci; 2021; 2021():8113253. PubMed ID: 35646109
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 13.