These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

226 related articles for article (PubMed ID: 35161853)

  • 1. A Dynamic Four-Step Data Security Model for Data in Cloud Computing Based on Cryptography and Steganography.
    Adee R; Mouratidis H
    Sensors (Basel); 2022 Feb; 22(3):. PubMed ID: 35161853
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Using Identity-Based Cryptography as a Foundation for an Effective and Secure Cloud Model for E-Health.
    Mittal S; Bansal A; Gupta D; Juneja S; Turabieh H; Elarabawy MM; Sharma A; Bitsue ZK
    Comput Intell Neurosci; 2022; 2022():7016554. PubMed ID: 35510050
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Computer Security Issues and Legal System Based on Cloud Computing.
    Li H
    Comput Intell Neurosci; 2022; 2022():8112212. PubMed ID: 35860647
    [TBL] [Abstract][Full Text] [Related]  

  • 4. A New Secure Model for Data Protection over Cloud Computing.
    Sauber AM; El-Kafrawy PM; Shawish AF; Amin MA; Hagag IM
    Comput Intell Neurosci; 2021; 2021():8113253. PubMed ID: 35646109
    [TBL] [Abstract][Full Text] [Related]  

  • 5. A deep learning based steganography integration framework for ad-hoc cloud computing data security augmentation using the V-BOINC system.
    Mawgoud AA; Taha MHN; Abu-Talleb A; Kotb A
    J Cloud Comput (Heidelb); 2022; 11(1):97. PubMed ID: 36569183
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Key Aggregation Cryptosystem and Double Encryption Method for Cloud-Based Intelligent Machine Learning Techniques-Based Health Monitoring Systems.
    Almuzaini KK; Sinhal AK; Ranjan R; Goel V; Shrivastava R; Halifa A
    Comput Intell Neurosci; 2022; 2022():3767912. PubMed ID: 35498196
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Secure Dynamic access control scheme of PHR in cloud computing.
    Chen TS; Liu CH; Chen TL; Chen CS; Bau JG; Lin TC
    J Med Syst; 2012 Dec; 36(6):4005-20. PubMed ID: 22926919
    [TBL] [Abstract][Full Text] [Related]  

  • 8. A Novel Blockchain and Bi-Linear Polynomial-Based QCP-ABE Framework for Privacy and Security over the Complex Cloud Data.
    Singamaneni KK; Ramana K; Dhiman G; Singh S; Yoon B
    Sensors (Basel); 2021 Nov; 21(21):. PubMed ID: 34770606
    [TBL] [Abstract][Full Text] [Related]  

  • 9. eHealth Cloud Security Challenges: A Survey.
    Al-Issa Y; Ottom MA; Tamrawi A
    J Healthc Eng; 2019; 2019():7516035. PubMed ID: 31565209
    [TBL] [Abstract][Full Text] [Related]  

  • 10. The Rise of Cloud Computing: Data Protection, Privacy, and Open Research Challenges-A Systematic Literature Review (SLR).
    Hassan J; Shehzad D; Habib U; Aftab MU; Ahmad M; Kuleev R; Mazzara M
    Comput Intell Neurosci; 2022; 2022():8303504. PubMed ID: 35712069
    [TBL] [Abstract][Full Text] [Related]  

  • 11. A Practical Evaluation of a High-Security Energy-Efficient Gateway for IoT Fog Computing Applications.
    Suárez-Albela M; Fernández-Caramés TM; Fraga-Lamas P; Castedo L
    Sensors (Basel); 2017 Aug; 17(9):. PubMed ID: 28850104
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Computer cyberspace security mechanism supported by cloud computing.
    Fu Z
    PLoS One; 2022; 17(10):e0271546. PubMed ID: 36206264
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Efficient and Secure Privacy Analysis for Medical Big Data Using TDES and MKSVM with Access Control in Cloud.
    Shanmugapriya E; Kavitha R
    J Med Syst; 2019 Jul; 43(8):265. PubMed ID: 31273467
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Security challenges and solutions using healthcare cloud computing.
    Mehrtak M; SeyedAlinaghi S; MohsseniPour M; Noori T; Karimi A; Shamsabadi A; Heydari M; Barzegary A; Mirzapour P; Soleymanzadeh M; Vahedi F; Mehraeen E; Dadras O
    J Med Life; 2021; 14(4):448-461. PubMed ID: 34621367
    [TBL] [Abstract][Full Text] [Related]  

  • 15. An environmental monitoring data sharing scheme based on attribute encryption in cloud-fog computing.
    Yang X; Xi W; Chen A; Wang C
    PLoS One; 2021; 16(9):e0258062. PubMed ID: 34591938
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Multi-sensor network tracking research utilizing searchable encryption algorithm in the cloud computing environment.
    Sun X; Li S
    PeerJ Comput Sci; 2023; 9():e1433. PubMed ID: 37409083
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Public Security Video Image Detection System Construction Platform in Cloud Computing Environment.
    Yin H
    Comput Intell Neurosci; 2022; 2022():4113803. PubMed ID: 35186061
    [TBL] [Abstract][Full Text] [Related]  

  • 18. A Practical Evaluation on RSA and ECC-Based Cipher Suites for IoT High-Security Energy-Efficient Fog and Mist Computing Devices.
    Suárez-Albela M; Fraga-Lamas P; Fernández-Caramés TM
    Sensors (Basel); 2018 Nov; 18(11):. PubMed ID: 30423831
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Double layer security using crypto-stego techniques: a comprehensive review.
    Jan A; Parah SA; Hussan M; Malik BA
    Health Technol (Berl); 2022; 12(1):9-31. PubMed ID: 34660167
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Searchable and revocable multi-data owner attribute-based encryption scheme with hidden policy in cloud storage.
    Wang S; Gao T; Zhang Y
    PLoS One; 2018; 13(11):e0206126. PubMed ID: 30383840
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 12.