These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

340 related articles for article (PubMed ID: 36146089)

  • 1. A Novel QKD Approach to Enhance IIOT Privacy and Computational Knacks.
    Singamaneni KK; Dhiman G; Juneja S; Muhammad G; AlQahtani SA; Zaki J
    Sensors (Basel); 2022 Sep; 22(18):. PubMed ID: 36146089
    [TBL] [Abstract][Full Text] [Related]  

  • 2. A Secure Online Fingerprint Authentication System for Industrial IoT Devices over 5G Networks.
    Bedari A; Wang S; Yang W
    Sensors (Basel); 2022 Oct; 22(19):. PubMed ID: 36236704
    [TBL] [Abstract][Full Text] [Related]  

  • 3. ASAP-IIOT: An Anonymous Secure Authentication Protocol for Industrial Internet of Things.
    Li N; Ma M; Wang H
    Sensors (Basel); 2024 Feb; 24(4):. PubMed ID: 38400400
    [TBL] [Abstract][Full Text] [Related]  

  • 4. A Novel Blockchain and Bi-Linear Polynomial-Based QCP-ABE Framework for Privacy and Security over the Complex Cloud Data.
    Singamaneni KK; Ramana K; Dhiman G; Singh S; Yoon B
    Sensors (Basel); 2021 Nov; 21(21):. PubMed ID: 34770606
    [TBL] [Abstract][Full Text] [Related]  

  • 5. A Secure Dynamic Identity and Chaotic Maps Based User Authentication and Key Agreement Scheme for e-Healthcare Systems.
    Li CT; Lee CC; Weng CY; Chen SJ
    J Med Syst; 2016 Nov; 40(11):233. PubMed ID: 27653040
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Deep Learning-Based Privacy-Preserving Data Transmission Scheme for Clustered IIoT Environment.
    Lakshmanna K; Kavitha R; Geetha BT; Nanda AK; Radhakrishnan A; Kohar R
    Comput Intell Neurosci; 2022; 2022():8927830. PubMed ID: 35720880
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Lightweight Digital Certificate Management and Efficacious Symmetric Cryptographic Mechanism over Industrial Internet of Things.
    Ahmed AA
    Sensors (Basel); 2021 Apr; 21(8):. PubMed ID: 33923644
    [TBL] [Abstract][Full Text] [Related]  

  • 8. A Survey on Industrial Internet of Things Security: Requirements, Attacks, AI-Based Solutions, and Edge Computing Opportunities.
    Alotaibi B
    Sensors (Basel); 2023 Aug; 23(17):. PubMed ID: 37687926
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Enhanced BB84 quantum cryptography protocol for secure communication in wireless body sensor networks for medical applications.
    V AD; V K
    Pers Ubiquitous Comput; 2023; 27(3):875-885. PubMed ID: 33758585
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT.
    K A; J S; Maurya S; Joseph S; Asokan A; M P; Algethami AA; Hamdi M; Rauf HT
    Sensors (Basel); 2021 Nov; 21(23):. PubMed ID: 34883794
    [TBL] [Abstract][Full Text] [Related]  

  • 11. A Blockchain-Based Secure Image Encryption Scheme for the Industrial Internet of Things.
    Khan PW; Byun Y
    Entropy (Basel); 2020 Feb; 22(2):. PubMed ID: 33285950
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Blockchain and PUF-based secure key establishment protocol for cross-domain digital twins in industrial Internet of Things architecture.
    Mahmood K; Shamshad S; Saleem MA; Kharel R; Das AK; Shetty S; Rodrigues JJPC
    J Adv Res; 2024 Aug; 62():155-163. PubMed ID: 37777064
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Satellite Quantum Communications When Man-in-the-Middle Attacks Are Excluded.
    Vergoossen T; Bedington R; Grieve JA; Ling A
    Entropy (Basel); 2019 Apr; 21(4):. PubMed ID: 33267101
    [TBL] [Abstract][Full Text] [Related]  

  • 14. A Secured and Intelligent Communication Scheme for IIoT-enabled Pervasive Edge Computing.
    Khan F; Jan MA; Rehman AU; Mastorakis S; Alazab M; Watter P
    IEEE Trans Industr Inform; 2021 Jul; 17(7):5128-5137. PubMed ID: 33994885
    [TBL] [Abstract][Full Text] [Related]  

  • 15. A secure remote user authentication scheme for 6LoWPAN-based Internet of Things.
    Abbas G; Tanveer M; Abbas ZH; Waqas M; Baker T; Al-Jumeily Obe D
    PLoS One; 2021; 16(11):e0258279. PubMed ID: 34748568
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Enterprise Data Sharing with Privacy-Preserved Based on Hyperledger Fabric Blockchain in IIOT's Application.
    Chen CL; Yang J; Tsaur WJ; Weng W; Wu CM; Wei X
    Sensors (Basel); 2022 Feb; 22(3):. PubMed ID: 35161893
    [TBL] [Abstract][Full Text] [Related]  

  • 17. A Lightweight Mutual Authentication and Privacy-preservation Scheme for Intelligent Wearable Devices in Industrial-CPS.
    Jan MA; Khan F; Khan R; Mastorakis S; Menon VG; Alazab M; Watters P
    IEEE Trans Industr Inform; 2021 Aug; 17(8):5829-5839. PubMed ID: 33981186
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Ensuring confidentiality and privacy of cloud data using a non-deterministic cryptographic scheme.
    Dawson JK; Twum F; Hayfron Acquah JB; Missah YM
    PLoS One; 2023; 18(2):e0274628. PubMed ID: 36758028
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Privacy Protection for Point-of-Care Using Chaotic Maps-Based Authentication and Key Agreement.
    Zhang L; Luo H; Zhao L; Zhang Y
    J Med Syst; 2018 Nov; 42(12):250. PubMed ID: 30390144
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Recent Technologies, Security Countermeasure and Ongoing Challenges of Industrial Internet of Things (IIoT): A Survey.
    Tan SF; Samsudin A
    Sensors (Basel); 2021 Oct; 21(19):. PubMed ID: 34640967
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 17.