These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

130 related articles for article (PubMed ID: 35214251)

  • 1. GRA-PIN: A Graphical and PIN-Based Hybrid Authentication Approach for Smart Devices.
    Kausar N; Din IU; Khan MA; Almogren A; Kim BS
    Sensors (Basel); 2022 Feb; 22(4):. PubMed ID: 35214251
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Evaluating authentication options for mobile health applications in younger and older adults.
    Grindrod K; Khan H; Hengartner U; Ong S; Logan AG; Vogel D; Gebotys R; Yang J
    PLoS One; 2018; 13(1):e0189048. PubMed ID: 29300736
    [TBL] [Abstract][Full Text] [Related]  

  • 3. A Fractal-Based Authentication Technique Using Sierpinski Triangles in Smart Devices.
    Ali A; Rafique H; Arshad T; Alqarni MA; Chauhdary SH; Bashir AK
    Sensors (Basel); 2019 Feb; 19(3):. PubMed ID: 30736448
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Secure and Efficient Two-Factor User Authentication Scheme with User Anonymity for Network Based E-Health Care Applications.
    Li X; Niu J; Karuppiah M; Kumari S; Wu F
    J Med Syst; 2016 Dec; 40(12):268. PubMed ID: 27734256
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Improved dynamic ID-based authentication scheme for telecare medical information systems.
    Cao T; Zhai J
    J Med Syst; 2013 Apr; 37(2):9912. PubMed ID: 23345091
    [TBL] [Abstract][Full Text] [Related]  

  • 6. A secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care.
    Das AK; Goswami A
    J Med Syst; 2013 Jun; 37(3):9948. PubMed ID: 23660745
    [TBL] [Abstract][Full Text] [Related]  

  • 7. A digital memories based user authentication scheme with privacy preservation.
    Liu J; Lyu Q; Wang Q; Yu X
    PLoS One; 2017; 12(11):e0186925. PubMed ID: 29190659
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Applications of Multi-Channel Safety Authentication Protocols in Wireless Networks.
    Chen YL; Liau RH; Chang LY
    J Med Syst; 2016 Jan; 40(1):26. PubMed ID: 26547846
    [TBL] [Abstract][Full Text] [Related]  

  • 9. An Efficient and Practical Smart Card Based Anonymity Preserving User Authentication Scheme for TMIS using Elliptic Curve Cryptography.
    Amin R; Islam SK; Biswas GP; Khan MK; Kumar N
    J Med Syst; 2015 Nov; 39(11):180. PubMed ID: 26433889
    [TBL] [Abstract][Full Text] [Related]  

  • 10. A Survey on Quantitative Risk Estimation Approaches for Secure and Usable User Authentication on Smartphones.
    Papaioannou M; Pelekoudas-Oikonomou F; Mantas G; Serrelis E; Rodriguez J; Fengou MA
    Sensors (Basel); 2023 Mar; 23(6):. PubMed ID: 36991690
    [TBL] [Abstract][Full Text] [Related]  

  • 11. A Secure Dynamic Identity and Chaotic Maps Based User Authentication and Key Agreement Scheme for e-Healthcare Systems.
    Li CT; Lee CC; Weng CY; Chen SJ
    J Med Syst; 2016 Nov; 40(11):233. PubMed ID: 27653040
    [TBL] [Abstract][Full Text] [Related]  

  • 12. An Improvement of Robust Biometrics-Based Authentication and Key Agreement Scheme for Multi-Server Environments Using Smart Cards.
    Moon J; Choi Y; Jung J; Won D
    PLoS One; 2015; 10(12):e0145263. PubMed ID: 26709702
    [TBL] [Abstract][Full Text] [Related]  

  • 13. A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems.
    Li CT; Lee CC; Weng CY
    J Med Syst; 2014 Sep; 38(9):77. PubMed ID: 24997858
    [TBL] [Abstract][Full Text] [Related]  

  • 14. A more secure anonymous user authentication scheme for the integrated EPR information system.
    Wen F
    J Med Syst; 2014 May; 38(5):42. PubMed ID: 24760224
    [TBL] [Abstract][Full Text] [Related]  

  • 15. A secure user anonymity-preserving three-factor remote user authentication scheme for the telecare medicine information systems.
    Das AK
    J Med Syst; 2015 Mar; 39(3):30. PubMed ID: 25677956
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Preventing shoulder-surfing attack with the concept of concealing the password objects' information.
    Ho PF; Kam YH; Wee MC; Chong YN; Por LY
    ScientificWorldJournal; 2014; 2014():838623. PubMed ID: 24991649
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Cognitive Based Authentication Protocol for Distributed Data and Web Technologies.
    Krzyworzeka N; Ogiela L; Ogiela MR
    Sensors (Basel); 2021 Oct; 21(21):. PubMed ID: 34770571
    [TBL] [Abstract][Full Text] [Related]  

  • 18. A secure smart-card based authentication and key agreement scheme for telecare medicine information systems.
    Lee TF; Liu CM
    J Med Syst; 2013 Jun; 37(3):9933. PubMed ID: 23494392
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Security analysis and enhancements of an effective biometric-based remote user authentication scheme using smart cards.
    An Y
    J Biomed Biotechnol; 2012; 2012():519723. PubMed ID: 22899887
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Press touch code: A finger press based screen size independent authentication scheme for smart devices.
    Ranak MSAN; Azad S; Nor NNHBM; Zamli KZ
    PLoS One; 2017; 12(10):e0186940. PubMed ID: 29084262
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 7.