BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

248 related articles for article (PubMed ID: 34502729)

  • 1. A Key Management Protocol Based on the Hash Chain Key Generation for Securing LoRaWAN Networks.
    Hakeem SAA; El-Kader SMA; Kim H
    Sensors (Basel); 2021 Aug; 21(17):. PubMed ID: 34502729
    [TBL] [Abstract][Full Text] [Related]  

  • 2. LPWAN Key Exchange: A Centralised Lightweight Approach.
    Pathak G; Gutierrez J; Ghobakhlou A; Rehman SU
    Sensors (Basel); 2022 Jul; 22(13):. PubMed ID: 35808559
    [TBL] [Abstract][Full Text] [Related]  

  • 3. An Enhanced LoRaWAN Security Protocol for Privacy Preservation in IoT with a Case Study on a Smart Factory-Enabled Parking System.
    You I; Kwon S; Choudhary G; Sharma V; Seo JT
    Sensors (Basel); 2018 Jun; 18(6):. PubMed ID: 29890704
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Enhancing LoRaWAN Security through a Lightweight and Authenticated Key Management Approach.
    Sanchez-Iborra R; Sánchez-Gómez J; Pérez S; Fernández PJ; Santa J; Hernández-Ramos JL; Skarmeta AF
    Sensors (Basel); 2018 Jun; 18(6):. PubMed ID: 29874839
    [TBL] [Abstract][Full Text] [Related]  

  • 5. A Complete Key Management Scheme for LoRaWAN v1.1.
    Chen X; Lech M; Wang L
    Sensors (Basel); 2021 Apr; 21(9):. PubMed ID: 33922603
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Comparative Experiments of V2X Security Protocol Based on Hash Chain Cryptography.
    Hakeem SAA; El-Gawad MAA; Kim H
    Sensors (Basel); 2020 Oct; 20(19):. PubMed ID: 33050065
    [TBL] [Abstract][Full Text] [Related]  

  • 7. A Secure Blockchain-Based Authentication and Key Agreement Scheme for 3GPP 5G Networks.
    Chow MC; Ma M
    Sensors (Basel); 2022 Jun; 22(12):. PubMed ID: 35746307
    [TBL] [Abstract][Full Text] [Related]  

  • 8. A Polynomial Subset-Based Efficient Multi-Party Key Management System for Lightweight Device Networks.
    Mahmood Z; Ning H; Ghafoor A
    Sensors (Basel); 2017 Mar; 17(4):. PubMed ID: 28338632
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Analysis of LoRaWAN 1.0 and 1.1 Protocols Security Mechanisms.
    Loukil S; Fourati LC; Nayyar A; Chee KW
    Sensors (Basel); 2022 May; 22(10):. PubMed ID: 35632125
    [TBL] [Abstract][Full Text] [Related]  

  • 10. A new adaptive XOR, hashing and encryption-based authentication protocol for secure transmission of the medical data in Internet of Things (IoT).
    Chaudhari DA; Umamaheswari E
    Biomed Tech (Berl); 2020 Aug; ():. PubMed ID: 32827390
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Lightweight Payload Encryption-Based Authentication Scheme for Advanced Metering Infrastructure Sensor Networks.
    Abosata N; Al-Rubaye S; Inalhan G
    Sensors (Basel); 2022 Jan; 22(2):. PubMed ID: 35062494
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Hash-Chain Fog/Edge: A Mode-Based Hash-Chain for Secured Mutual Authentication Protocol Using Zero-Knowledge Proofs in Fog/Edge.
    Pardeshi MS; Sheu RK; Yuan SM
    Sensors (Basel); 2022 Jan; 22(2):. PubMed ID: 35062563
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Mutual Authentication Scheme in Secure Internet of Things Technology for Comfortable Lifestyle.
    Park N; Kang N
    Sensors (Basel); 2015 Dec; 16(1):. PubMed ID: 26712759
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Leveraging Larger AES Keys in LoRaWAN: A Practical Evaluation of Energy and Time Costs.
    Thaenkaew P; Quoitin B; Meddahi A
    Sensors (Basel); 2023 Nov; 23(22):. PubMed ID: 38005557
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Enhancing Security in ZigBee Wireless Sensor Networks: A New Approach and Mutual Authentication Scheme for D2D Communication.
    Allakany A; Saber A; Mostafa SM; Alsabaan M; Ibrahem MI; Elwahsh H
    Sensors (Basel); 2023 Jun; 23(12):. PubMed ID: 37420868
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Enhancing Key Management in LoRaWAN with Permissioned Blockchain.
    Ribeiro V; Holanda R; Ramos A; Rodrigues JJPC
    Sensors (Basel); 2020 May; 20(11):. PubMed ID: 32485791
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Securing IoT-Based RFID Systems: A Robust Authentication Protocol Using Symmetric Cryptography.
    Mansoor K; Ghani A; Chaudhry SA; Shamshirband S; Ghayyur SAK; Mosavi A
    Sensors (Basel); 2019 Nov; 19(21):. PubMed ID: 31683885
    [TBL] [Abstract][Full Text] [Related]  

  • 18. A Malicious Behavior Awareness and Defense Countermeasure Based on LoRaWAN Protocol.
    Gao SY; Li XH; Ma MD
    Sensors (Basel); 2019 Nov; 19(23):. PubMed ID: 31766778
    [TBL] [Abstract][Full Text] [Related]  

  • 19. LoRaCog: A Protocol for Cognitive Radio-Based LoRa Network.
    Salika F; Nasser A; Mroue M; Parrein B; Mansour A
    Sensors (Basel); 2022 May; 22(10):. PubMed ID: 35632294
    [TBL] [Abstract][Full Text] [Related]  

  • 20. S6AE: Securing 6LoWPAN Using Authenticated Encryption Scheme.
    Tanveer M; Abbas G; Abbas ZH; Waqas M; Muhammad F; Kim S
    Sensors (Basel); 2020 May; 20(9):. PubMed ID: 32397469
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 13.