BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

119 related articles for article (PubMed ID: 34695133)

  • 1. New constructions of equality test scheme for cloud-assisted wireless sensor networks.
    Zhu H; Xie D; Ahmad H; Hasan Abdullah HN
    PLoS One; 2021; 16(10):e0258746. PubMed ID: 34695133
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Analysis of an ABE Scheme with Verifiable Outsourced Decryption.
    Liao Y; He Y; Li F; Jiang S; Zhou S
    Sensors (Basel); 2018 Jan; 18(1):. PubMed ID: 29320418
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Efficient Equality Test on Identity-Based Ciphertexts Supporting Flexible Authorization.
    Li N
    Entropy (Basel); 2023 Feb; 25(2):. PubMed ID: 36832728
    [TBL] [Abstract][Full Text] [Related]  

  • 4. A keyword searchable attribute-based encryption scheme with attribute update for cloud storage.
    Wang S; Ye J; Zhang Y
    PLoS One; 2018; 13(5):e0197318. PubMed ID: 29795577
    [TBL] [Abstract][Full Text] [Related]  

  • 5. P2GT: Fine-Grained Genomic Data Access Control With Privacy-Preserving Testing in Cloud Computing.
    Huang Q; Yue W; Yang Y; Chen L
    IEEE/ACM Trans Comput Biol Bioinform; 2022; 19(4):2385-2398. PubMed ID: 33656996
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Unified Fine-Grained Access Control for Personal Health Records in Cloud Computing.
    Li W; Liu BM; Liu D; Liu RP; Wang P; Luo S; Ni W
    IEEE J Biomed Health Inform; 2019 May; 23(3):1278-1289. PubMed ID: 29994490
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Efficient secure-channel free public key encryption with keyword search for EMRs in cloud storage.
    Guo L; Yau WC
    J Med Syst; 2015 Feb; 39(2):11. PubMed ID: 25634700
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Traceable ciphertext-policy attribute-based encryption scheme with attribute level user revocation for cloud storage.
    Wang S; Guo K; Zhang Y
    PLoS One; 2018; 13(9):e0203225. PubMed ID: 30212473
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Efficiently Multi-User Searchable Encryption Scheme with Attribute Revocation and Grant for Cloud Storage.
    Wang S; Zhang X; Zhang Y
    PLoS One; 2016; 11(11):e0167157. PubMed ID: 27898703
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Identity-Based Encryption with Filtered Equality Test for Smart City Applications.
    Ming Y; Wang E
    Sensors (Basel); 2019 Jul; 19(14):. PubMed ID: 31295922
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Lightweight Fine-Grained Access Control for Wireless Body Area Networks.
    Ali M; Sadeghi MR; Liu X
    Sensors (Basel); 2020 Feb; 20(4):. PubMed ID: 32079301
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Improving the proof of "Privacy-preserving attribute-keyword based data publish-subscribe service on cloud platforms".
    Wang S; Zhang Q; Zhang Y; Sun J; Chen J; Sun X
    PLoS One; 2019; 14(2):e0212761. PubMed ID: 30802275
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Cryptanalysis and security improvements of 'two-factor user authentication in wireless sensor networks'.
    Khan MK; Alghathbar K
    Sensors (Basel); 2010; 10(3):2450-9. PubMed ID: 22294935
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Data Division Scheme Based on Homomorphic Encryption in WSNs for Health Care.
    Wang X; Zhang Z
    J Med Syst; 2015 Dec; 39(12):188. PubMed ID: 26490146
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Traceable Scheme of Public Key Encryption with Equality Test.
    Zhu H; Xue Q; Li T; Xie D
    Entropy (Basel); 2022 Feb; 24(3):. PubMed ID: 35327820
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Privacy Protection and Intrusion Detection System of Wireless Sensor Network Based on Artificial Neural Network.
    Shi L; Li K
    Comput Intell Neurosci; 2022; 2022():1795454. PubMed ID: 35785102
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Searchable and revocable multi-data owner attribute-based encryption scheme with hidden policy in cloud storage.
    Wang S; Gao T; Zhang Y
    PLoS One; 2018; 13(11):e0206126. PubMed ID: 30383840
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Backward Compatible Identity-Based Encryption.
    Kim J
    Sensors (Basel); 2023 Apr; 23(9):. PubMed ID: 37177384
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Ensuring confidentiality and privacy of cloud data using a non-deterministic cryptographic scheme.
    Dawson JK; Twum F; Hayfron Acquah JB; Missah YM
    PLoS One; 2023; 18(2):e0274628. PubMed ID: 36758028
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Optimization of a Deep Learning Algorithm for Security Protection of Big Data from Video Images.
    Geng Q; Yan H; Lu X
    Comput Intell Neurosci; 2022; 2022():3394475. PubMed ID: 35300398
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 6.