These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

122 related articles for article (PubMed ID: 35684771)

  • 21. A Lightweight and Robust Secure Key Establishment Protocol for Internet of Medical Things in COVID-19 Patients Care.
    Masud M; Gaba GS; Alqahtani S; Muhammad G; Gupta BB; Kumar P; Ghoneim A
    IEEE Internet Things J; 2021 Nov; 8(21):15694-15703. PubMed ID: 35782176
    [TBL] [Abstract][Full Text] [Related]  

  • 22. A Lightweight Anonymous Authentication Protocol with Perfect Forward Secrecy for Wireless Sensor Networks.
    Xiong L; Peng D; Peng T; Liang H; Liu Z
    Sensors (Basel); 2017 Nov; 17(11):. PubMed ID: 29160861
    [TBL] [Abstract][Full Text] [Related]  

  • 23. The Ring-LWE Problem in Lattice-Based Cryptography: The Case of Twisted Embeddings.
    Ortiz JN; de Araujo RR; Aranha DF; Costa SIR; Dahab R
    Entropy (Basel); 2021 Aug; 23(9):. PubMed ID: 34573733
    [TBL] [Abstract][Full Text] [Related]  

  • 24. LC-DEX: Lightweight and Efficient Compressed Authentication Based Elliptic Curve Cryptography in Multi-Hop 6LoWPAN Wireless Sensor Networks in HIP-Based Internet of Things.
    Bettoumi B; Bouallegue R
    Sensors (Basel); 2021 Nov; 21(21):. PubMed ID: 34770655
    [TBL] [Abstract][Full Text] [Related]  

  • 25. Optimized ECC Implementation for Secure Communication between Heterogeneous IoT Devices.
    Marin L; Pawlowski MP; Jara A
    Sensors (Basel); 2015 Aug; 15(9):21478-99. PubMed ID: 26343677
    [TBL] [Abstract][Full Text] [Related]  

  • 26. Securing IoT-Based RFID Systems: A Robust Authentication Protocol Using Symmetric Cryptography.
    Mansoor K; Ghani A; Chaudhry SA; Shamshirband S; Ghayyur SAK; Mosavi A
    Sensors (Basel); 2019 Nov; 19(21):. PubMed ID: 31683885
    [TBL] [Abstract][Full Text] [Related]  

  • 27. A Provably Secure IBE Transformation Model for PKC Using Conformable Chebyshev Chaotic Maps under Human-Centered IoT Environments.
    Meshram C; Imoize AL; Aljaedi A; Alharbi AR; Jamal SS; Barve SK
    Sensors (Basel); 2021 Oct; 21(21):. PubMed ID: 34770535
    [TBL] [Abstract][Full Text] [Related]  

  • 28. Compact Finite Field Multiplication Processor Structure for Cryptographic Algorithms in IoT Devices with Limited Resources.
    Ibrahim A; Gebali F
    Sensors (Basel); 2022 Mar; 22(6):. PubMed ID: 35336260
    [TBL] [Abstract][Full Text] [Related]  

  • 29. Lattice-based group signatures with forward security for anonymous authentication.
    Chen S; Chen J
    Heliyon; 2023 Apr; 9(4):e14917. PubMed ID: 37101632
    [TBL] [Abstract][Full Text] [Related]  

  • 30. A Secure and Efficient ECC-Based Scheme for Edge Computing and Internet of Things.
    AlMajed H; AlMogren A
    Sensors (Basel); 2020 Oct; 20(21):. PubMed ID: 33138018
    [TBL] [Abstract][Full Text] [Related]  

  • 31. Cryptanalysis and Improvement of a Privacy-Preserving Three-Factor Authentication Protocol for Wireless Sensor Networks.
    Renuka K; Kumar S; Kumari S; Chen CM
    Sensors (Basel); 2019 Oct; 19(21):. PubMed ID: 31653025
    [TBL] [Abstract][Full Text] [Related]  

  • 32. A Lightweight System-On-Chip Based Cryptographic Core for Low-Cost Devices.
    Gookyi DAN; Ryoo K
    Sensors (Basel); 2022 Apr; 22(8):. PubMed ID: 35458989
    [TBL] [Abstract][Full Text] [Related]  

  • 33. Lightweight Payload Encryption-Based Authentication Scheme for Advanced Metering Infrastructure Sensor Networks.
    Abosata N; Al-Rubaye S; Inalhan G
    Sensors (Basel); 2022 Jan; 22(2):. PubMed ID: 35062494
    [TBL] [Abstract][Full Text] [Related]  

  • 34. A Lightweight Protocol for Secure Video Streaming.
    Venčkauskas A; Morkevicius N; Bagdonas K; Damaševičius R; Maskeliūnas R
    Sensors (Basel); 2018 May; 18(5):. PubMed ID: 29757988
    [TBL] [Abstract][Full Text] [Related]  

  • 35. Multi-Unit Serial Polynomial Multiplier to Accelerate NTRU-Based Cryptographic Schemes in IoT Embedded Systems.
    Sánchez-Solano S; Camacho-Ruiz E; Martínez-Rodríguez MC; Brox P
    Sensors (Basel); 2022 Mar; 22(5):. PubMed ID: 35271204
    [TBL] [Abstract][Full Text] [Related]  

  • 36. Exponential Arithmetic Based Self-Healing Group Key Distribution Scheme with Backward Secrecy under the Resource-Constrained Wireless Networks.
    Guo H; Zheng Y; Zhang X; Li Z
    Sensors (Basel); 2016 Apr; 16(5):. PubMed ID: 27136550
    [TBL] [Abstract][Full Text] [Related]  

  • 37. An Effective Multifactor Authentication Mechanism Based on Combiners of Hash Function over Internet of Things.
    Ahmed AA; Ahmed WA
    Sensors (Basel); 2019 Aug; 19(17):. PubMed ID: 31443608
    [TBL] [Abstract][Full Text] [Related]  

  • 38. An efficient multilevel security architecture for blockchain-based IoT networks using principles of cellular automata.
    Ali F; Mathew S
    PeerJ Comput Sci; 2022; 8():e989. PubMed ID: 35721416
    [TBL] [Abstract][Full Text] [Related]  

  • 39. A Lattice-Based Homomorphic Proxy Re-Encryption Scheme with Strong Anti-Collusion for Cloud Computing.
    Li J; Qiao Z; Zhang K; Cui C
    Sensors (Basel); 2021 Jan; 21(1):. PubMed ID: 33406662
    [TBL] [Abstract][Full Text] [Related]  

  • 40. A secured cryptographic system based on DNA and a hybrid key generation approach.
    Indrasena Reddy M; Siva Kumar AP; Subba Reddy K
    Biosystems; 2020 Nov; 197():104207. PubMed ID: 32653339
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 7.