These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

134 related articles for article (PubMed ID: 35498166)

  • 21. A Selective Encryption Algorithm Based on AES for Medical Information.
    Oh JY; Yang DI; Chon KH
    Healthc Inform Res; 2010 Mar; 16(1):22-9. PubMed ID: 21818420
    [TBL] [Abstract][Full Text] [Related]  

  • 22. A Randomness Detection Method of ZigBee Protocol in a Wireless Sensor Network.
    Tang Y; Lian H; Li L; Wang X; Yan X
    Sensors (Basel); 2018 Nov; 18(11):. PubMed ID: 30445740
    [TBL] [Abstract][Full Text] [Related]  

  • 23. Hybrid Pipeline Hardware Architecture Based on Error Detection and Correction for AES.
    Algredo-Badillo I; Ramírez-Gutiérrez KA; Morales-Rosales LA; Pacheco Bautista D; Feregrino-Uribe C
    Sensors (Basel); 2021 Aug; 21(16):. PubMed ID: 34451097
    [TBL] [Abstract][Full Text] [Related]  

  • 24. JLVEA: Lightweight Real-Time Video Stream Encryption Algorithm for Internet of Things.
    Yun J; Kim M
    Sensors (Basel); 2020 Jun; 20(13):. PubMed ID: 32605207
    [TBL] [Abstract][Full Text] [Related]  

  • 25. Enhancement of the CAST Block Algorithm Based on Novel S-Box for Image Encryption.
    Ali RS; Akif OZ; Jassim SA; Farhan AK; El-Kenawy EM; Ibrahim A; Ghoneim ME; Abdelhamid AA
    Sensors (Basel); 2022 Nov; 22(21):. PubMed ID: 36366230
    [TBL] [Abstract][Full Text] [Related]  

  • 26. Distributed power analysis attack on SM4 encryption chip.
    Gong H; Ju T
    Sci Rep; 2024 Jan; 14(1):1007. PubMed ID: 38200004
    [TBL] [Abstract][Full Text] [Related]  

  • 27. Security Analysis of the Image Encryption Algorithm Based on a Two-Dimensional Infinite Collapse Map.
    Shi G; Yu S; Wang Q
    Entropy (Basel); 2022 Jul; 24(8):. PubMed ID: 35893003
    [TBL] [Abstract][Full Text] [Related]  

  • 28. A compact and efficient AES-32GF for encryption in small IoT devices.
    Dhanda SS; Jindal P; Singh B; Panwar D
    MethodsX; 2023 Dec; 11():102491. PubMed ID: 38076709
    [TBL] [Abstract][Full Text] [Related]  

  • 29. Secure Image Encryption Using Chaotic, Hybrid Chaotic and Block Cipher Approach.
    Chaudhary N; Shahi TB; Neupane A
    J Imaging; 2022 Jun; 8(6):. PubMed ID: 35735966
    [TBL] [Abstract][Full Text] [Related]  

  • 30. A Novel Image Encryption Technique Based on Cyclic Codes over Galois Field.
    Asif M; Asamoah JKK; Hazzazi MM; Alharbi AR; Ashraf MU; Alghamdi AM
    Comput Intell Neurosci; 2022; 2022():1912603. PubMed ID: 35178075
    [TBL] [Abstract][Full Text] [Related]  

  • 31. S-Box Design Based on 2D Multiple Collapse Chaotic Map and Their Application in Image Encryption.
    Yang C; Wei X; Wang C
    Entropy (Basel); 2021 Oct; 23(10):. PubMed ID: 34682036
    [TBL] [Abstract][Full Text] [Related]  

  • 32. High-Efficiency Parallel Cryptographic Accelerator for Real-Time Guaranteeing Dynamic Data Security in Embedded Systems.
    Zhang Z; Wang X; Hao Q; Xu D; Zhang J; Liu J; Ma J
    Micromachines (Basel); 2021 May; 12(5):. PubMed ID: 34063441
    [TBL] [Abstract][Full Text] [Related]  

  • 33. An Image Encryption Algorithm Using Cascade Chaotic Map and S-Box.
    Zheng J; Bao T
    Entropy (Basel); 2022 Dec; 24(12):. PubMed ID: 36554231
    [TBL] [Abstract][Full Text] [Related]  

  • 34. Attribute based honey encryption algorithm for securing big data: Hadoop distributed file system perspective.
    Kapil G; Agrawal A; Attaallah A; Algarni A; Kumar R; Khan RA
    PeerJ Comput Sci; 2020; 6():e259. PubMed ID: 33816911
    [TBL] [Abstract][Full Text] [Related]  

  • 35. Resource Shared Galois Field Computation for Energy Efficient AES/CRC in IoT Applications.
    Noor SM; John EB
    IEEE Trans Sustain Comput; 2019; 4(4):340-348. PubMed ID: 34307869
    [TBL] [Abstract][Full Text] [Related]  

  • 36. Embedding security into ferroelectric FET array via in situ memory operation.
    Xu Y; Xiao Y; Zhao Z; Müller F; Vardar A; Gong X; George S; Kämpfe T; Narayanan V; Ni K
    Nat Commun; 2023 Dec; 14(1):8287. PubMed ID: 38092753
    [TBL] [Abstract][Full Text] [Related]  

  • 37. A secured cryptographic system based on DNA and a hybrid key generation approach.
    Indrasena Reddy M; Siva Kumar AP; Subba Reddy K
    Biosystems; 2020 Nov; 197():104207. PubMed ID: 32653339
    [TBL] [Abstract][Full Text] [Related]  

  • 38. Cryptanalysis of an Image Encryption Algorithm Based on Two-Dimensional Hyperchaotic Map.
    Jiang Q; Yu S; Wang Q
    Entropy (Basel); 2023 Feb; 25(3):. PubMed ID: 36981284
    [TBL] [Abstract][Full Text] [Related]  

  • 39. Chaotic medical image encryption method using attention mechanism fusion ResNet model.
    Li X; Peng H
    Front Neurosci; 2023; 17():1226154. PubMed ID: 37521702
    [TBL] [Abstract][Full Text] [Related]  

  • 40. Leveraging Larger AES Keys in LoRaWAN: A Practical Evaluation of Energy and Time Costs.
    Thaenkaew P; Quoitin B; Meddahi A
    Sensors (Basel); 2023 Nov; 23(22):. PubMed ID: 38005557
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 7.