These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

267 related articles for article (PubMed ID: 35590800)

  • 21. Secure Communications for Resource-Constrained IoT Devices.
    Taha AM; Rashwan AM; Hassanein HS
    Sensors (Basel); 2020 Jun; 20(13):. PubMed ID: 32610438
    [TBL] [Abstract][Full Text] [Related]  

  • 22. A Review of IoT Sensing Applications and Challenges Using RFID and Wireless Sensor Networks.
    Landaluce H; Arjona L; Perallos A; Falcone F; Angulo I; Muralter F
    Sensors (Basel); 2020 Apr; 20(9):. PubMed ID: 32354063
    [TBL] [Abstract][Full Text] [Related]  

  • 23. A Secure and Lightweight Authentication Protocol for IoT-Based Smart Homes.
    Oh J; Yu S; Lee J; Son S; Kim M; Park Y
    Sensors (Basel); 2021 Feb; 21(4):. PubMed ID: 33669920
    [TBL] [Abstract][Full Text] [Related]  

  • 24. Privacy-Aware Architectures for NFC and RFID Sensors in Healthcare Applications.
    Raso E; Bianco GM; Bracciale L; Marrocco G; Occhiuzzi C; Loreti P
    Sensors (Basel); 2022 Dec; 22(24):. PubMed ID: 36560061
    [TBL] [Abstract][Full Text] [Related]  

  • 25. Hash-MAC-DSDV: Mutual Authentication for Intelligent IoT-Based Cyber-Physical Systems.
    Adil M; Jan MA; Mastorakis S; Song H; Jadoon MM; Abbas S; Farouk A
    IEEE Internet Things J; 2022 Nov; 9(22):22173-22183. PubMed ID: 37448955
    [TBL] [Abstract][Full Text] [Related]  

  • 26. RAPCHI: Robust authentication protocol for IoMT-based cloud-healthcare infrastructure.
    Kumar V; Mahmoud MS; Alkhayyat A; Srinivas J; Ahmad M; Kumari A
    J Supercomput; 2022; 78(14):16167-16196. PubMed ID: 35530181
    [TBL] [Abstract][Full Text] [Related]  

  • 27. Survey: Vulnerability Analysis of Low-Cost ECC-Based RFID Protocols against Wireless and Side-Channel Attacks.
    Gabsi S; Beroulle V; Kieffer Y; Dao HM; Kortli Y; Hamdi B
    Sensors (Basel); 2021 Aug; 21(17):. PubMed ID: 34502714
    [TBL] [Abstract][Full Text] [Related]  

  • 28. A Lightweight RFID Mutual Authentication Protocol with PUF.
    Zhu F; Li P; Xu H; Wang R
    Sensors (Basel); 2019 Jul; 19(13):. PubMed ID: 31277487
    [TBL] [Abstract][Full Text] [Related]  

  • 29. Internet of Things Applications: Opportunities and Threats.
    Rahmani AM; Bayramov S; Kiani Kalejahi B
    Wirel Pers Commun; 2022; 122(1):451-476. PubMed ID: 34426718
    [TBL] [Abstract][Full Text] [Related]  

  • 30. Internet of Nano-Things (IoNT): A Comprehensive Review from Architecture to Security and Privacy Challenges.
    Alabdulatif A; Thilakarathne NN; Lawal ZK; Fahim KE; Zakari RY
    Sensors (Basel); 2023 Mar; 23(5):. PubMed ID: 36905010
    [TBL] [Abstract][Full Text] [Related]  

  • 31. A Lightweight Authentication and Key Agreement Schemes for IoT Environments.
    Lee DH; Lee IY
    Sensors (Basel); 2020 Sep; 20(18):. PubMed ID: 32961979
    [TBL] [Abstract][Full Text] [Related]  

  • 32. Security Requirements for the Internet of Things: A Systematic Approach.
    Pal S; Hitchens M; Rabehaja T; Mukhopadhyay S
    Sensors (Basel); 2020 Oct; 20(20):. PubMed ID: 33086542
    [TBL] [Abstract][Full Text] [Related]  

  • 33. Efficient security level in wireless sensor networks (WSNs) using four-factors authentication over the Internet of Things (IoT).
    Alsumayt A; Alshammari M; Alfawaer ZM; Al-Wesabi FN; El-Haggar N; Aljameel SS; Albassam S; AlGhareeb S; Alghamdi NM; Aldossary N
    PeerJ Comput Sci; 2024; 10():e2091. PubMed ID: 38983196
    [TBL] [Abstract][Full Text] [Related]  

  • 34. LDAKM-EIoT: Lightweight Device Authentication and Key Management Mechanism for Edge-Based IoT Deployment.
    Wazid M; Das AK; Shetty S; J P C Rodrigues J; Park Y
    Sensors (Basel); 2019 Dec; 19(24):. PubMed ID: 31847431
    [TBL] [Abstract][Full Text] [Related]  

  • 35. A Secure RFID Tag Authentication Protocol with Privacy Preserving in Telecare Medicine Information System.
    Li CT; Weng CY; Lee CC
    J Med Syst; 2015 Aug; 39(8):77. PubMed ID: 26084587
    [TBL] [Abstract][Full Text] [Related]  

  • 36. iAKA-CIoT: An Improved Authentication and Key Agreement Scheme for Cloud Enabled Internet of Things Using Physical Unclonable Function.
    Park K; Park Y
    Sensors (Basel); 2022 Aug; 22(16):. PubMed ID: 36016023
    [TBL] [Abstract][Full Text] [Related]  

  • 37. DIdM-EIoTD: Distributed Identity Management for Edge Internet of Things (IoT) Devices.
    Sadique KM; Rahmani R; Johannesson P
    Sensors (Basel); 2023 Apr; 23(8):. PubMed ID: 37112389
    [TBL] [Abstract][Full Text] [Related]  

  • 38. Machine Learning for Authentication and Authorization in IoT: Taxonomy, Challenges and Future Research Direction.
    Istiaque Ahmed K; Tahir M; Hadi Habaebi M; Lun Lau S; Ahad A
    Sensors (Basel); 2021 Jul; 21(15):. PubMed ID: 34372360
    [TBL] [Abstract][Full Text] [Related]  

  • 39. Hash-Chain Fog/Edge: A Mode-Based Hash-Chain for Secured Mutual Authentication Protocol Using Zero-Knowledge Proofs in Fog/Edge.
    Pardeshi MS; Sheu RK; Yuan SM
    Sensors (Basel); 2022 Jan; 22(2):. PubMed ID: 35062563
    [TBL] [Abstract][Full Text] [Related]  

  • 40. Identifying and Mitigating Phishing Attack Threats in IoT Use Cases Using a Threat Modelling Approach.
    Abbas SG; Vaccari I; Hussain F; Zahid S; Fayyaz UU; Shah GA; Bakhshi T; Cambiaso E
    Sensors (Basel); 2021 Jul; 21(14):. PubMed ID: 34300556
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 14.