These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

119 related articles for article (PubMed ID: 34695133)

  • 21. An environmental monitoring data sharing scheme based on attribute encryption in cloud-fog computing.
    Yang X; Xi W; Chen A; Wang C
    PLoS One; 2021; 16(9):e0258062. PubMed ID: 34591938
    [TBL] [Abstract][Full Text] [Related]  

  • 22. A Hybrid Scheme for Fine-Grained Search and Access Authorization in Fog Computing Environment.
    Xiao M; Zhou J; Liu X; Jiang M
    Sensors (Basel); 2017 Jun; 17(6):. PubMed ID: 28629131
    [TBL] [Abstract][Full Text] [Related]  

  • 23. Provably Secure Heterogeneous Access Control Scheme for Wireless Body Area Network.
    Omala AA; Mbandu AS; Mutiria KD; Jin C; Li F
    J Med Syst; 2018 Apr; 42(6):108. PubMed ID: 29705947
    [TBL] [Abstract][Full Text] [Related]  

  • 24. Blockchain-Based Access Control Scheme for Secure Shared Personal Health Records over Decentralised Storage.
    Hussien HM; Yasin SM; Udzir NI; Ninggal MIH
    Sensors (Basel); 2021 Apr; 21(7):. PubMed ID: 33918266
    [TBL] [Abstract][Full Text] [Related]  

  • 25. Certificateless broadcast signcryption scheme supporting equality test in smart grid.
    Niu S; Dong R; Fang L
    PLoS One; 2023; 18(9):e0290666. PubMed ID: 37676890
    [TBL] [Abstract][Full Text] [Related]  

  • 26. Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation.
    Nam J; Choo KK; Han S; Kim M; Paik J; Won D
    PLoS One; 2015; 10(4):e0116709. PubMed ID: 25849359
    [TBL] [Abstract][Full Text] [Related]  

  • 27. Efficient lattice-based revocable attribute-based encryption against decryption key exposure for cloud file sharing.
    Huang B; Gao J; Li X
    J Cloud Comput (Heidelb); 2023; 12(1):37. PubMed ID: 36937653
    [TBL] [Abstract][Full Text] [Related]  

  • 28. An Efficient Ciphertext-Policy Weighted Attribute-Based Encryption for the Internet of Health Things.
    Li H; Yu K; Liu B; Feng C; Qin Z; Srivastava G
    IEEE J Biomed Health Inform; 2022 May; 26(5):1949-1960. PubMed ID: 33905340
    [TBL] [Abstract][Full Text] [Related]  

  • 29. A Lattice-Based Homomorphic Proxy Re-Encryption Scheme with Strong Anti-Collusion for Cloud Computing.
    Li J; Qiao Z; Zhang K; Cui C
    Sensors (Basel); 2021 Jan; 21(1):. PubMed ID: 33406662
    [TBL] [Abstract][Full Text] [Related]  

  • 30. A Secure and Efficient Data Sharing and Searching Scheme in Wireless Sensor Networks.
    Zhu B; Susilo W; Qin J; Guo F; Zhao Z; Ma J
    Sensors (Basel); 2019 Jun; 19(11):. PubMed ID: 31174350
    [TBL] [Abstract][Full Text] [Related]  

  • 31. Hybrid Technique for Cyber-Physical Security in Cloud-Based Smart Industries.
    Garg D; Rani S; Herencsar N; Verma S; Wozniak M; Ijaz MF
    Sensors (Basel); 2022 Jun; 22(12):. PubMed ID: 35746411
    [TBL] [Abstract][Full Text] [Related]  

  • 32. A Secure and Lightweight Fine-Grained Data Sharing Scheme for Mobile Cloud Computing.
    Li H; Lan C; Fu X; Wang C; Li F; Guo H
    Sensors (Basel); 2020 Aug; 20(17):. PubMed ID: 32825602
    [TBL] [Abstract][Full Text] [Related]  

  • 33. A broadcast-based key agreement scheme using set reconciliation for wireless body area networks.
    Ali A; Khan FA
    J Med Syst; 2014 May; 38(5):33. PubMed ID: 24744081
    [TBL] [Abstract][Full Text] [Related]  

  • 34. A Novel Energy Efficient Topology Control Scheme Based on a Coverage-Preserving and Sleep Scheduling Model for Sensor Networks.
    Shi B; Wei W; Wang Y; Shu W
    Sensors (Basel); 2016 Oct; 16(10):. PubMed ID: 27754405
    [TBL] [Abstract][Full Text] [Related]  

  • 35. Differential Privacy Preserving in Big Data Analytics for Connected Health.
    Lin C; Song Z; Song H; Zhou Y; Wang Y; Wu G
    J Med Syst; 2016 Apr; 40(4):97. PubMed ID: 26872779
    [TBL] [Abstract][Full Text] [Related]  

  • 36. A Ring Learning with Errors-Based Ciphertext-Policy Attribute-Based Proxy Re-Encryption Scheme for Secure Big Data Sharing in Cloud Environment.
    Li J; Peng J; Qiao Z
    Big Data; 2022 Apr; ():. PubMed ID: 35417273
    [TBL] [Abstract][Full Text] [Related]  

  • 37. Secure and Efficient Three-Factor Protocol for Wireless Sensor Networks.
    Ryu J; Lee H; Kim H; Won D
    Sensors (Basel); 2018 Dec; 18(12):. PubMed ID: 30567374
    [TBL] [Abstract][Full Text] [Related]  

  • 38. SecureMed: Secure Medical Computation Using GPU-Accelerated Homomorphic Encryption Scheme.
    Khedr A; Gulak G
    IEEE J Biomed Health Inform; 2018 Mar; 22(2):597-606. PubMed ID: 28129194
    [TBL] [Abstract][Full Text] [Related]  

  • 39. Secure Data Aggregation with Fully Homomorphic Encryption in Large-Scale Wireless Sensor Networks.
    Li X; Chen D; Li C; Wang L
    Sensors (Basel); 2015 Jul; 15(7):15952-73. PubMed ID: 26151208
    [TBL] [Abstract][Full Text] [Related]  

  • 40. Privacy-Preserving Location-Based Service Scheme for Mobile Sensing Data.
    Xie Q; Wang L
    Sensors (Basel); 2016 Nov; 16(12):. PubMed ID: 27897984
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 6.