BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

123 related articles for article (PubMed ID: 35417273)

  • 1. A Ring Learning with Errors-Based Ciphertext-Policy Attribute-Based Proxy Re-Encryption Scheme for Secure Big Data Sharing in Cloud Environment.
    Li J; Peng J; Qiao Z
    Big Data; 2022 Apr; ():. PubMed ID: 35417273
    [TBL] [Abstract][Full Text] [Related]  

  • 2. A keyword searchable attribute-based encryption scheme with attribute update for cloud storage.
    Wang S; Ye J; Zhang Y
    PLoS One; 2018; 13(5):e0197318. PubMed ID: 29795577
    [TBL] [Abstract][Full Text] [Related]  

  • 3. A revocable storage CP-ABE scheme with constant ciphertext length in cloud storage.
    Zhao Y; Xie X; Zhang X; Ding Y
    Math Biosci Eng; 2019 May; 16(5):4229-4249. PubMed ID: 31499660
    [TBL] [Abstract][Full Text] [Related]  

  • 4. A Lattice-Based Homomorphic Proxy Re-Encryption Scheme with Strong Anti-Collusion for Cloud Computing.
    Li J; Qiao Z; Zhang K; Cui C
    Sensors (Basel); 2021 Jan; 21(1):. PubMed ID: 33406662
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Efficient lattice-based revocable attribute-based encryption against decryption key exposure for cloud file sharing.
    Huang B; Gao J; Li X
    J Cloud Comput (Heidelb); 2023; 12(1):37. PubMed ID: 36937653
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Attribute-based encryption scheme with multi-keyword search and supporting attribute revocation in cloud storage.
    Wang S; Yao L; Zhang Y
    PLoS One; 2018; 13(10):e0205675. PubMed ID: 30312345
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Traceable ciphertext-policy attribute-based encryption scheme with attribute level user revocation for cloud storage.
    Wang S; Guo K; Zhang Y
    PLoS One; 2018; 13(9):e0203225. PubMed ID: 30212473
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Searchable and revocable multi-data owner attribute-based encryption scheme with hidden policy in cloud storage.
    Wang S; Gao T; Zhang Y
    PLoS One; 2018; 13(11):e0206126. PubMed ID: 30383840
    [TBL] [Abstract][Full Text] [Related]  

  • 9. An Access Control Scheme Based on Blockchain and Ciphertext Policy-Attribute Based Encryption.
    Hu R; Ma Z; Li L; Zuo P; Li X; Wei J; Liu S
    Sensors (Basel); 2023 Sep; 23(19):. PubMed ID: 37836868
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Efficiently Multi-User Searchable Encryption Scheme with Attribute Revocation and Grant for Cloud Storage.
    Wang S; Zhang X; Zhang Y
    PLoS One; 2016; 11(11):e0167157. PubMed ID: 27898703
    [TBL] [Abstract][Full Text] [Related]  

  • 11. A Study on CP-ABE-based Medical Data Sharing System with Key Abuse Prevention and Verifiable Outsourcing in the IoMT Environment.
    Hwang YW; Lee IY
    Sensors (Basel); 2020 Aug; 20(17):. PubMed ID: 32878202
    [TBL] [Abstract][Full Text] [Related]  

  • 12. A Secured Proxy-Based Data Sharing Module in IoT Environments Using Blockchain.
    Obour Agyekum KO; Xia Q; Sifah EB; Gao J; Xia H; Du X; Guizani M
    Sensors (Basel); 2019 Mar; 19(5):. PubMed ID: 30862110
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Attribute-Based Verifiable Conditional Proxy Re-Encryption Scheme.
    Tang Y; Jin M; Meng H; Yang L; Zheng C
    Entropy (Basel); 2023 May; 25(5):. PubMed ID: 37238577
    [TBL] [Abstract][Full Text] [Related]  

  • 14. A Hybrid Scheme for Fine-Grained Search and Access Authorization in Fog Computing Environment.
    Xiao M; Zhou J; Liu X; Jiang M
    Sensors (Basel); 2017 Jun; 17(6):. PubMed ID: 28629131
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Access Control Based on Ciphertext Attribute Authentication and Threshold Policy for the Internet of Things.
    Zhang Q; Li Y; Li Z; Yuan J; Gan Y; Luo X
    Sensors (Basel); 2019 Nov; 19(23):. PubMed ID: 31795236
    [TBL] [Abstract][Full Text] [Related]  

  • 16. A revocable attribute-based encryption EHR sharing scheme with multiple authorities in blockchain.
    Yang X; Li W; Fan K
    Peer Peer Netw Appl; 2023; 16(1):107-125. PubMed ID: 36188111
    [TBL] [Abstract][Full Text] [Related]  

  • 17. A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing.
    Fan K; Wang J; Wang X; Li H; Yang Y
    Sensors (Basel); 2017 Jul; 17(7):. PubMed ID: 28737733
    [TBL] [Abstract][Full Text] [Related]  

  • 18. An efficient and secure attribute based signcryption scheme with LSSS access structure.
    Hong H; Sun Z
    Springerplus; 2016; 5():644. PubMed ID: 27330910
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Attribute-based multi-user collaborative searchable encryption in COVID-19.
    Zhao F; Peng C; Xu D; Liu Y; Niu K; Tang H
    Comput Commun; 2023 May; 205():118-126. PubMed ID: 37128501
    [TBL] [Abstract][Full Text] [Related]  

  • 20. EVOAC-HP: An Efficient and Verifiable Outsourced Access Control Scheme with Hidden Policy.
    Ma H; Zhou D; Li P; Wang X
    Sensors (Basel); 2023 Apr; 23(9):. PubMed ID: 37177587
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 7.