These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

119 related articles for article (PubMed ID: 35595820)

  • 1. A formal analysis method for composition protocol based on model checking.
    Xiao M; Zhao H; Yang K; Ouyang R; Song W
    Sci Rep; 2022 May; 12(1):8493. PubMed ID: 35595820
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Formal Analysis of the Security Protocol with Timestamp Using SPIN.
    Xiao M; Song W; Yang K; OuYang R; Zhao H
    Comput Intell Neurosci; 2022; 2022():2420590. PubMed ID: 36052031
    [TBL] [Abstract][Full Text] [Related]  

  • 3. On the verification of intransitive noninterference in mulitlevel security.
    Ben Hadj-Alouane N; Lafrance S; Lin F; Mullins J; Yeddes MM
    IEEE Trans Syst Man Cybern B Cybern; 2005 Oct; 35(5):948-58. PubMed ID: 16240770
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Can Formal Security Verification Really Be Optional? Scrutinizing the Security of IMD Authentication Protocols.
    Duguma DG; You I; Gebremariam YE; Kim J
    Sensors (Basel); 2021 Dec; 21(24):. PubMed ID: 34960473
    [TBL] [Abstract][Full Text] [Related]  

  • 5. On the Design and Implementation of the External Data Integrity Tracking and Verification System for Stream Computing System in IoT.
    Wang H; Zu B; Zhu W; Li Y; Wu J
    Sensors (Basel); 2022 Aug; 22(17):. PubMed ID: 36080969
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Secure anonymity-preserving password-based user authentication and session key agreement scheme for telecare medicine information systems.
    Sutrala AK; Das AK; Odelu V; Wazid M; Kumari S
    Comput Methods Programs Biomed; 2016 Oct; 135():167-85. PubMed ID: 27586489
    [TBL] [Abstract][Full Text] [Related]  

  • 7. A verification strategy for web services composition using enhanced stacked automata model.
    Nagamouttou D; Egambaram I; Krishnan M; Narasingam P
    Springerplus; 2015; 4():98. PubMed ID: 25810951
    [TBL] [Abstract][Full Text] [Related]  

  • 8. A model based security testing method for protocol implementation.
    Fu YL; Xin XL
    ScientificWorldJournal; 2014; 2014():632154. PubMed ID: 25105163
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Secure Authentication Protocol for Wireless Sensor Networks in Vehicular Communications.
    Yu S; Lee J; Lee K; Park K; Park Y
    Sensors (Basel); 2018 Sep; 18(10):. PubMed ID: 30248898
    [TBL] [Abstract][Full Text] [Related]  

  • 10. The help of formal models for healthcare security policies.
    Trouessin G; Barber B
    Stud Health Technol Inform; 1997; 43 Pt B():786-90. PubMed ID: 10179775
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Security protocols analysis including various time parameters.
    Szymoniak S
    Math Biosci Eng; 2021 Jan; 18(2):1136-1153. PubMed ID: 33757179
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Reasoning about clinical guidelines based on algebraic data types and constraint logic programming.
    Pérez B
    J Biomed Inform; 2019 Apr; 92():103134. PubMed ID: 30831315
    [TBL] [Abstract][Full Text] [Related]  

  • 13. A Formal Analysis of the Mimblewimble Cryptocurrency Protocol.
    Silveira A; Betarte G; Cristiá M; Luna C
    Sensors (Basel); 2021 Sep; 21(17):. PubMed ID: 34502842
    [TBL] [Abstract][Full Text] [Related]  

  • 14. A Mutual Authentication Framework for Wireless Medical Sensor Networks.
    Srinivas J; Mishra D; Mukhopadhyay S
    J Med Syst; 2017 May; 41(5):80. PubMed ID: 28364358
    [TBL] [Abstract][Full Text] [Related]  

  • 15. A novel user authentication and key agreement protocol for accessing multi-medical server usable in TMIS.
    Amin R; Biswas GP
    J Med Syst; 2015 Mar; 39(3):33. PubMed ID: 25681100
    [TBL] [Abstract][Full Text] [Related]  

  • 16. IMSC-EIoTD: Identity Management and Secure Communication for Edge IoT Devices.
    Sadique KM; Rahmani R; Johannesson P
    Sensors (Basel); 2020 Nov; 20(22):. PubMed ID: 33207820
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Securing IoT-Based RFID Systems: A Robust Authentication Protocol Using Symmetric Cryptography.
    Mansoor K; Ghani A; Chaudhry SA; Shamshirband S; Ghayyur SAK; Mosavi A
    Sensors (Basel); 2019 Nov; 19(21):. PubMed ID: 31683885
    [TBL] [Abstract][Full Text] [Related]  

  • 18. An Improved RSA Based User Authentication and Session Key Agreement Protocol Usable in TMIS.
    Amin R; Biswas GP
    J Med Syst; 2015 Aug; 39(8):79. PubMed ID: 26123833
    [TBL] [Abstract][Full Text] [Related]  

  • 19. An improved and efficient mutual authentication scheme for session initiation protocol.
    Zhang Y; Xie K; Ruan O
    PLoS One; 2019; 14(3):e0213688. PubMed ID: 30921341
    [TBL] [Abstract][Full Text] [Related]  

  • 20. A Secure and Robust User Authenticated Key Agreement Scheme for Hierarchical Multi-medical Server Environment in TMIS.
    Das AK; Odelu V; Goswami A
    J Med Syst; 2015 Sep; 39(9):92. PubMed ID: 26245854
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 6.