These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

175 related articles for article (PubMed ID: 35991685)

  • 1. An Authentication-Based Secure Data Aggregation Method in Internet of Things.
    Ataei Nezhad M; Barati H; Barati A
    J Grid Comput; 2022; 20(3):29. PubMed ID: 35991685
    [TBL] [Abstract][Full Text] [Related]  

  • 2. SecAODV: A Secure Healthcare Routing Scheme Based on Hybrid Cryptography in Wireless Body Sensor Networks.
    Jeong H; Lee SW; Hussain Malik M; Yousefpoor E; Yousefpoor MS; Ahmed OH; Hosseinzadeh M; Mosavi A
    Front Med (Lausanne); 2022; 9():829055. PubMed ID: 35935783
    [TBL] [Abstract][Full Text] [Related]  

  • 3. A secure remote user authentication scheme for 6LoWPAN-based Internet of Things.
    Abbas G; Tanveer M; Abbas ZH; Waqas M; Baker T; Al-Jumeily Obe D
    PLoS One; 2021; 16(11):e0258279. PubMed ID: 34748568
    [TBL] [Abstract][Full Text] [Related]  

  • 4. A Lightweight Anonymous Client⁻Server Authentication Scheme for the Internet of Things Scenario: LAuth.
    Chen Y; Martínez JF; Castillejo P; López L
    Sensors (Basel); 2018 Oct; 18(11):. PubMed ID: 30380793
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Lightweight Authentication Mechanism for Industrial IoT Environment Combining Elliptic Curve Cryptography and Trusted Token.
    Yang YS; Lee SH; Wang JM; Yang CS; Huang YM; Hou TW
    Sensors (Basel); 2023 May; 23(10):. PubMed ID: 37430882
    [TBL] [Abstract][Full Text] [Related]  

  • 6. A Secure and Efficient ECC-Based Scheme for Edge Computing and Internet of Things.
    AlMajed H; AlMogren A
    Sensors (Basel); 2020 Oct; 20(21):. PubMed ID: 33138018
    [TBL] [Abstract][Full Text] [Related]  

  • 7. LC-DEX: Lightweight and Efficient Compressed Authentication Based Elliptic Curve Cryptography in Multi-Hop 6LoWPAN Wireless Sensor Networks in HIP-Based Internet of Things.
    Bettoumi B; Bouallegue R
    Sensors (Basel); 2021 Nov; 21(21):. PubMed ID: 34770655
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Dickson polynomial-based secure group authentication scheme for Internet of Things.
    Syed SA; Manickam S; Uddin M; Alsufyani H; Shorfuzzaman M; Selvarajan S; Mohammed GB
    Sci Rep; 2024 Feb; 14(1):4947. PubMed ID: 38418484
    [TBL] [Abstract][Full Text] [Related]  

  • 9. An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System.
    Li CT; Wu TY; Chen CL; Lee CC; Chen CM
    Sensors (Basel); 2017 Jun; 17(7):. PubMed ID: 28644381
    [TBL] [Abstract][Full Text] [Related]  

  • 10. A fuzzy logic-based secure hierarchical routing scheme using firefly algorithm in Internet of Things for healthcare.
    Hosseinzadeh M; Yoo J; Ali S; Lansky J; Mildeova S; Yousefpoor MS; Ahmed OH; Rahmani AM; Tightiz L
    Sci Rep; 2023 Jul; 13(1):11058. PubMed ID: 37422490
    [TBL] [Abstract][Full Text] [Related]  

  • 11. A new adaptive XOR, hashing and encryption-based authentication protocol for secure transmission of the medical data in Internet of Things (IoT).
    Chaudhari DA; Umamaheswari E
    Biomed Tech (Berl); 2020 Aug; ():. PubMed ID: 32827390
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Elliptic Curve-Based Query Authentication Protocol for IoT Devices Aided by Blockchain.
    Nita SL; Mihailescu MI
    Sensors (Basel); 2023 Jan; 23(3):. PubMed ID: 36772410
    [TBL] [Abstract][Full Text] [Related]  

  • 13. SGHRP: Secure Greedy Highway Routing Protocol with authentication and increased privacy in vehicular ad hoc networks.
    Khezri E; Zeinali E; Sargolzaey H
    PLoS One; 2023; 18(4):e0282031. PubMed ID: 37023137
    [TBL] [Abstract][Full Text] [Related]  

  • 14. ASAP-IIOT: An Anonymous Secure Authentication Protocol for Industrial Internet of Things.
    Li N; Ma M; Wang H
    Sensors (Basel); 2024 Feb; 24(4):. PubMed ID: 38400400
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Efficient security level in wireless sensor networks (WSNs) using four-factors authentication over the Internet of Things (IoT).
    Alsumayt A; Alshammari M; Alfawaer ZM; Al-Wesabi FN; El-Haggar N; Aljameel SS; Albassam S; AlGhareeb S; Alghamdi NM; Aldossary N
    PeerJ Comput Sci; 2024; 10():e2091. PubMed ID: 38983196
    [TBL] [Abstract][Full Text] [Related]  

  • 16. A review: a new authentication protocol for real-time healthcare monitoring system.
    Dewangan K; Mishra M; Dewangan NK
    Ir J Med Sci; 2021 Aug; 190(3):927-932. PubMed ID: 33145637
    [TBL] [Abstract][Full Text] [Related]  

  • 17. An Improved Authentication and Security on Efficient Generalized Group Key Agreement Using Hyper Elliptic Curve Based Public Key Cryptography for IoT Health Care System.
    Kavitha S; Alphonse PJA; Reddy YV
    J Med Syst; 2019 Jul; 43(8):260. PubMed ID: 31267216
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Mutual Authentication Scheme in Secure Internet of Things Technology for Comfortable Lifestyle.
    Park N; Kang N
    Sensors (Basel); 2015 Dec; 16(1):. PubMed ID: 26712759
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Hash-Chain Fog/Edge: A Mode-Based Hash-Chain for Secured Mutual Authentication Protocol Using Zero-Knowledge Proofs in Fog/Edge.
    Pardeshi MS; Sheu RK; Yuan SM
    Sensors (Basel); 2022 Jan; 22(2):. PubMed ID: 35062563
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Practical Three-Factor Authentication Protocol Based on Elliptic Curve Cryptography for Industrial Internet of Things.
    Zhao X; Li D; Li H
    Sensors (Basel); 2022 Oct; 22(19):. PubMed ID: 36236609
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 9.