BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

179 related articles for article (PubMed ID: 35062450)

  • 1. A Comparative Study of Post-Quantum Cryptosystems for Internet-of-Things Applications.
    Septien-Hernandez JA; Arellano-Vazquez M; Contreras-Cruz MA; Ramirez-Paredes JP
    Sensors (Basel); 2022 Jan; 22(2):. PubMed ID: 35062450
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Secure IoT in the Era of Quantum Computers-Where Are the Bottlenecks?
    Schöffel M; Lauer F; Rheinländer CC; Wehn N
    Sensors (Basel); 2022 Mar; 22(7):. PubMed ID: 35408099
    [TBL] [Abstract][Full Text] [Related]  

  • 3. An Enhanced Architecture to Resolve Public-Key Cryptographic Issues in the Internet of Things (IoT), Employing Quantum Computing Supremacy.
    Shamshad S; Riaz F; Riaz R; Rizvi SS; Abdulla S
    Sensors (Basel); 2022 Oct; 22(21):. PubMed ID: 36365848
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Transitioning organizations to post-quantum cryptography.
    Joseph D; Misoczki R; Manzano M; Tricot J; Pinuaga FD; Lacombe O; Leichenauer S; Hidary J; Venables P; Hansen R
    Nature; 2022 May; 605(7909):237-243. PubMed ID: 35546191
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Clock Frequency Impact on the Performance of High-Security Cryptographic Cipher Suites for Energy-Efficient Resource-Constrained IoT Devices.
    Suárez-Albela M; Fraga-Lamas P; Castedo L; Fernández-Caramés TM
    Sensors (Basel); 2018 Dec; 19(1):. PubMed ID: 30577524
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms.
    Farooq S; Altaf A; Iqbal F; Thompson EB; Vargas DLR; Díez IT; Ashraf I
    Sensors (Basel); 2023 Jun; 23(12):. PubMed ID: 37420546
    [TBL] [Abstract][Full Text] [Related]  

  • 7. A Secure Communication System for Constrained IoT Devices-Experiences and Recommendations.
    Goworko M; Wytrębowicz J
    Sensors (Basel); 2021 Oct; 21(20):. PubMed ID: 34696119
    [TBL] [Abstract][Full Text] [Related]  

  • 8. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks.
    Kim KW; Han YH; Min SG
    Sensors (Basel); 2017 Sep; 17(10):. PubMed ID: 28934152
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Post-quantum cryptography.
    Bernstein DJ; Lange T
    Nature; 2017 Sep; 549(7671):188-194. PubMed ID: 28905891
    [TBL] [Abstract][Full Text] [Related]  

  • 10. FPGA Implementation for Elliptic Curve Cryptography Algorithm and Circuit with High Efficiency and Low Delay for IoT Applications.
    Wang D; Lin Y; Hu J; Zhang C; Zhong Q
    Micromachines (Basel); 2023 May; 14(5):. PubMed ID: 37241660
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Biometrics-based Internet of Things and Big data design framework.
    Ang KL; Seng KP
    Math Biosci Eng; 2021 May; 18(4):4461-4476. PubMed ID: 34198448
    [TBL] [Abstract][Full Text] [Related]  

  • 12. A secure remote user authentication scheme for 6LoWPAN-based Internet of Things.
    Abbas G; Tanveer M; Abbas ZH; Waqas M; Baker T; Al-Jumeily Obe D
    PLoS One; 2021; 16(11):e0258279. PubMed ID: 34748568
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Implementation and Evaluation of Four Interoperable Open Standards for the Internet of Things.
    Jazayeri MA; Liang SH; Huang CY
    Sensors (Basel); 2015 Sep; 15(9):24343-73. PubMed ID: 26402683
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Optimized ECC Implementation for Secure Communication between Heterogeneous IoT Devices.
    Marin L; Pawlowski MP; Jara A
    Sensors (Basel); 2015 Aug; 15(9):21478-99. PubMed ID: 26343677
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Multi-Unit Serial Polynomial Multiplier to Accelerate NTRU-Based Cryptographic Schemes in IoT Embedded Systems.
    Sánchez-Solano S; Camacho-Ruiz E; Martínez-Rodríguez MC; Brox P
    Sensors (Basel); 2022 Mar; 22(5):. PubMed ID: 35271204
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Quantum-Safe Group Key Establishment Protocol from Lattice Trapdoors.
    Gebremichael T; Gidlund M; Hancke GP; Jennehag U
    Sensors (Basel); 2022 May; 22(11):. PubMed ID: 35684771
    [TBL] [Abstract][Full Text] [Related]  

  • 17. A Novel Approach of a Low-Cost Voltage Fault Injection Method for Resource-Constrained IoT Devices: Design and Analysis.
    Ruminot N; Estevez C; Montejo-Sánchez S
    Sensors (Basel); 2023 Aug; 23(16):. PubMed ID: 37631717
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Compact Finite Field Multiplication Processor Structure for Cryptographic Algorithms in IoT Devices with Limited Resources.
    Ibrahim A; Gebali F
    Sensors (Basel); 2022 Mar; 22(6):. PubMed ID: 35336260
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Towards Secure and Privacy-Preserving IoT Enabled Smart Home: Architecture and Experimental Study.
    Abu-Tair M; Djahel S; Perry P; Scotney B; Zia U; Carracedo JM; Sajjad A
    Sensors (Basel); 2020 Oct; 20(21):. PubMed ID: 33126629
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Bio-Inspired Approaches to Safety and Security in IoT-Enabled Cyber-Physical Systems.
    Johnson AP; Al-Aqrabi H; Hill R
    Sensors (Basel); 2020 Feb; 20(3):. PubMed ID: 32033269
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 9.