These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
116 related articles for article (PubMed ID: 34898266)
1. Attribute-Based Adaptive Homomorphic Encryption for Big Data Security. Thenmozhi R; Shridevi S; Mohanty SN; García-Díaz V; Gupta D; Tiwari P; Shorfuzzaman M Big Data; 2024 Oct; 12(5):343-356. PubMed ID: 34898266 [TBL] [Abstract][Full Text] [Related]
2. A Ring Learning with Errors-Based Ciphertext-Policy Attribute-Based Proxy Re-Encryption Scheme for Secure Big Data Sharing in Cloud Environment. Li J; Peng J; Qiao Z Big Data; 2024 Oct; 12(5):357-366. PubMed ID: 35417273 [TBL] [Abstract][Full Text] [Related]
3. Towards Secure Big Data Analysis via Fully Homomorphic Encryption Algorithms. Hamza R; Hassan A; Ali A; Bashir MB; Alqhtani SM; Tawfeeg TM; Yousif A Entropy (Basel); 2022 Apr; 24(4):. PubMed ID: 35455182 [TBL] [Abstract][Full Text] [Related]
4. Preserving Health Care Data Security and Privacy Using Carmichael's Theorem-Based Homomorphic Encryption and Modified Enhanced Homomorphic Encryption Schemes in Edge Computing Systems. Kumari KA; Sharma A; Chakraborty C; Ananyaa M Big Data; 2022 Feb; 10(1):1-17. PubMed ID: 34375143 [TBL] [Abstract][Full Text] [Related]
5. Integrating meta-heuristic with named data networking for secure edge computing in IoT enabled healthcare monitoring system. Manogaran N; Nandagopal M; Abi NE; Seerangan K; Balusamy B; Selvarajan S Sci Rep; 2024 Sep; 14(1):21532. PubMed ID: 39278954 [TBL] [Abstract][Full Text] [Related]
6. Optimization of a Deep Learning Algorithm for Security Protection of Big Data from Video Images. Geng Q; Yan H; Lu X Comput Intell Neurosci; 2022; 2022():3394475. PubMed ID: 35300398 [TBL] [Abstract][Full Text] [Related]
7. Secure Collaborative Platform for Health Care Research in an Open Environment: Perspective on Accountability in Access Control. Kang G; Kim YG J Med Internet Res; 2022 Oct; 24(10):e37978. PubMed ID: 36240003 [TBL] [Abstract][Full Text] [Related]
8. Privacy-preserving approximate GWAS computation based on homomorphic encryption. Kim D; Son Y; Kim D; Kim A; Hong S; Cheon JH BMC Med Genomics; 2020 Jul; 13(Suppl 7):77. PubMed ID: 32693801 [TBL] [Abstract][Full Text] [Related]
9. Pigeon Inspired Optimization with Encryption Based Secure Medical Image Management System. Geetha BT; Mohan P; Mayuri AVR; Jackulin T; Aldo Stalin JL; Anitha V Comput Intell Neurosci; 2022; 2022():2243827. PubMed ID: 35978898 [TBL] [Abstract][Full Text] [Related]
10. Research on medical data security sharing scheme based on homomorphic encryption. Guo L; Gao W; Cao Y; Lai X Math Biosci Eng; 2023 Jan; 20(2):2261-2279. PubMed ID: 36899533 [TBL] [Abstract][Full Text] [Related]
11. Attribute based honey encryption algorithm for securing big data: Hadoop distributed file system perspective. Kapil G; Agrawal A; Attaallah A; Algarni A; Kumar R; Khan RA PeerJ Comput Sci; 2020; 6():e259. PubMed ID: 33816911 [TBL] [Abstract][Full Text] [Related]
12. Digital marketing program design based on abnormal consumer behavior data classification and improved homomorphic encryption algorithm. Cui J; Jiang H; Xu Z PeerJ Comput Sci; 2023; 9():e1690. PubMed ID: 38077578 [TBL] [Abstract][Full Text] [Related]
13. SecDedoop: Secure Deduplication with Access Control of Big Data in the HDFS/Hadoop Environment. Ramya P; Sundar C Big Data; 2020 Apr; 8(2):147-163. PubMed ID: 32319799 [TBL] [Abstract][Full Text] [Related]
14. CP-BDHCA: Blockchain-Based Confidentiality-Privacy Preserving Big Data Scheme for Healthcare Clouds and Applications. Ghayvat H; Pandya S; Bhattacharya P; Zuhair M; Rashid M; Hakak S; Dev K IEEE J Biomed Health Inform; 2022 May; 26(5):1937-1948. PubMed ID: 34260362 [TBL] [Abstract][Full Text] [Related]
15. Efficient and Secure Privacy Analysis for Medical Big Data Using TDES and MKSVM with Access Control in Cloud. Shanmugapriya E; Kavitha R J Med Syst; 2019 Jul; 43(8):265. PubMed ID: 31273467 [TBL] [Abstract][Full Text] [Related]
16. Logistic regression over encrypted data from fully homomorphic encryption. Chen H; Gilad-Bachrach R; Han K; Huang Z; Jalali A; Laine K; Lauter K BMC Med Genomics; 2018 Oct; 11(Suppl 4):81. PubMed ID: 30309350 [TBL] [Abstract][Full Text] [Related]
17. A Lattice-Based Homomorphic Proxy Re-Encryption Scheme with Strong Anti-Collusion for Cloud Computing. Li J; Qiao Z; Zhang K; Cui C Sensors (Basel); 2021 Jan; 21(1):. PubMed ID: 33406662 [TBL] [Abstract][Full Text] [Related]
18. Analytical Study of Hybrid Techniques for Image Encryption and Decryption. Chowdhary CL; Patel PV; Kathrotia KJ; Attique M; P K; Ijaz MF Sensors (Basel); 2020 Sep; 20(18):. PubMed ID: 32927714 [TBL] [Abstract][Full Text] [Related]
19. Privacy-Oriented Technique for COVID-19 Contact Tracing (PROTECT) Using Homomorphic Encryption: Design and Development Study. An Y; Lee S; Jung S; Park H; Song Y; Ko T J Med Internet Res; 2021 Jul; 23(7):e26371. PubMed ID: 33999829 [TBL] [Abstract][Full Text] [Related]
20. Compressive sensing based secure data aggregation scheme for IoT based WSN applications. Salim A; Ismail A; Osamy W; M Khedr A PLoS One; 2021; 16(12):e0260634. PubMed ID: 34914706 [TBL] [Abstract][Full Text] [Related] [Next] [New Search]