BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

117 related articles for article (PubMed ID: 35327917)

  • 1. An Approach for Security Enhancement of Certain Encryption Schemes Employing Error Correction Coding and Simulated Synchronization Errors.
    Mihaljević MJ; Wang L; Xu S
    Entropy (Basel); 2022 Mar; 24(3):. PubMed ID: 35327917
    [TBL] [Abstract][Full Text] [Related]  

  • 2. A Security Enhanced Encryption Scheme and Evaluation of Its Cryptographic Security.
    Mihaljević MJ
    Entropy (Basel); 2019 Jul; 21(7):. PubMed ID: 33267415
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Vulnerability to chosen-plaintext attack of optoelectronic information encryption with phase-shifting interferometry.
    Qin W; Peng X; Meng X; Gao BZ
    Opt Eng; 2011 Jun; 50(6):. PubMed ID: 23894214
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Multiuser communication scheme based on binary phase-shift keying and chaos for telemedicine.
    Michel-Macarty JA; Murillo-Escobar MA; López-Gutiérrez RM; Cruz-Hernández C; Cardoza-Avendaño L
    Comput Methods Programs Biomed; 2018 Aug; 162():165-175. PubMed ID: 29903483
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Shifted LT Code Security Scheme for Partial Information Encryption.
    Zhang S; Niu F; Wang L; Yu L
    Entropy (Basel); 2022 Dec; 24(12):. PubMed ID: 36554181
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Efficient secure-channel free public key encryption with keyword search for EMRs in cloud storage.
    Guo L; Yau WC
    J Med Syst; 2015 Feb; 39(2):11. PubMed ID: 25634700
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Error function attack of chaos synchronization based encryption schemes.
    Wang X; Zhan M; Lai CH; Gang H
    Chaos; 2004 Mar; 14(1):128-37. PubMed ID: 15003053
    [TBL] [Abstract][Full Text] [Related]  

  • 8. How to Construct Polar Codes for Ring-LWE-Based Public Key Encryption.
    Wang J; Ling C
    Entropy (Basel); 2021 Jul; 23(8):. PubMed ID: 34441077
    [TBL] [Abstract][Full Text] [Related]  

  • 9. (Inner-Product) Functional Encryption with Updatable Ciphertexts.
    Cini V; Ramacher S; Slamanig D; Striecks C; Tairi E
    J Cryptol; 2024; 37(1):8. PubMed ID: 38274003
    [TBL] [Abstract][Full Text] [Related]  

  • 10. A Lattice-Based Homomorphic Proxy Re-Encryption Scheme with Strong Anti-Collusion for Cloud Computing.
    Li J; Qiao Z; Zhang K; Cui C
    Sensors (Basel); 2021 Jan; 21(1):. PubMed ID: 33406662
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Cryptoanalysis and enhancement of a binary image encryption system based on interference.
    Du J; Xiong Y; Quan C
    Appl Opt; 2021 Sep; 60(26):8038-8045. PubMed ID: 34613065
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Security enhanced optical encryption system by random phase key and permutation key.
    He M; Tan Q; Cao L; He Q; Jin G
    Opt Express; 2009 Dec; 17(25):22462-73. PubMed ID: 20052170
    [TBL] [Abstract][Full Text] [Related]  

  • 13. A keyword searchable attribute-based encryption scheme with attribute update for cloud storage.
    Wang S; Ye J; Zhang Y
    PLoS One; 2018; 13(5):e0197318. PubMed ID: 29795577
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Binary-tree encryption strategy for optical multiple-image encryption.
    Yi J; Tan G
    Appl Opt; 2016 Jul; 55(20):5280-91. PubMed ID: 27409301
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Is QR code an optimal data container in optical encryption systems from an error-correction coding perspective?
    Jiao S; Jin Z; Zhou C; Zou W; Li X
    J Opt Soc Am A Opt Image Sci Vis; 2018 Jan; 35(1):A23-A29. PubMed ID: 29328081
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Blockchain-Based Access Control Scheme for Secure Shared Personal Health Records over Decentralised Storage.
    Hussien HM; Yasin SM; Udzir NI; Ninggal MIH
    Sensors (Basel); 2021 Apr; 21(7):. PubMed ID: 33918266
    [TBL] [Abstract][Full Text] [Related]  

  • 17. A Study on CP-ABE-based Medical Data Sharing System with Key Abuse Prevention and Verifiable Outsourcing in the IoMT Environment.
    Hwang YW; Lee IY
    Sensors (Basel); 2020 Aug; 20(17):. PubMed ID: 32878202
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Security Analysis and Improvement of an Image Encryption Cryptosystem Based on Bit Plane Extraction and Multi Chaos.
    Zhu S; Zhu C
    Entropy (Basel); 2021 Apr; 23(5):. PubMed ID: 33922307
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Non-Reconciled Physical-Layer Keys-Assisted Secure Communication Scheme Based on Channel Correlation.
    Wang M; Huang K; Wan Z; Sun X; Jin L; Zhao K
    Entropy (Basel); 2022 Aug; 24(8):. PubMed ID: 36010831
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Cryptographic scheme using genetic algorithm and optical responses of periodic structures.
    Chen JS; Chen YB; Hsu PF; Nguyen-Huu N; Lo YL
    Opt Express; 2011 Apr; 19(9):8187-99. PubMed ID: 21643069
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 6.