These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

253 related articles for article (PubMed ID: 36501862)

  • 21. Enhancing Sensor Network Security with Improved Internal Hardware Design.
    Wang W; Deng Z; Wang J
    Sensors (Basel); 2019 Apr; 19(8):. PubMed ID: 31013741
    [TBL] [Abstract][Full Text] [Related]  

  • 22. Hardware Trojan Attacks on the Reconfigurable Interconnections of Field-Programmable Gate Array-Based Convolutional Neural Network Accelerators and a Physically Unclonable Function-Based Countermeasure Detection Technique.
    Hou J; Liu Z; Yang Z; Yang C
    Micromachines (Basel); 2024 Jan; 15(1):. PubMed ID: 38276848
    [TBL] [Abstract][Full Text] [Related]  

  • 23. Implementation and Optimization of Zero-Knowledge Proof Circuit Based on Hash Function SM3.
    Yang Y; Han S; Xie P; Zhu Y; Ding Z; Hou S; Xu S; Zheng H
    Sensors (Basel); 2022 Aug; 22(16):. PubMed ID: 36015708
    [TBL] [Abstract][Full Text] [Related]  

  • 24. Hash-Chain Fog/Edge: A Mode-Based Hash-Chain for Secured Mutual Authentication Protocol Using Zero-Knowledge Proofs in Fog/Edge.
    Pardeshi MS; Sheu RK; Yuan SM
    Sensors (Basel); 2022 Jan; 22(2):. PubMed ID: 35062563
    [TBL] [Abstract][Full Text] [Related]  

  • 25. SHA-256 Hardware Proposal for IoT Devices in the Blockchain Context.
    Santos CEB; Silva LMDD; Torquato MF; Silva SN; Fernandes MAC
    Sensors (Basel); 2024 Jun; 24(12):. PubMed ID: 38931692
    [TBL] [Abstract][Full Text] [Related]  

  • 26. A secure remote user authentication scheme for 6LoWPAN-based Internet of Things.
    Abbas G; Tanveer M; Abbas ZH; Waqas M; Baker T; Al-Jumeily Obe D
    PLoS One; 2021; 16(11):e0258279. PubMed ID: 34748568
    [TBL] [Abstract][Full Text] [Related]  

  • 27. Hash-MAC-DSDV: Mutual Authentication for Intelligent IoT-Based Cyber-Physical Systems.
    Adil M; Jan MA; Mastorakis S; Song H; Jadoon MM; Abbas S; Farouk A
    IEEE Internet Things J; 2022 Nov; 9(22):22173-22183. PubMed ID: 37448955
    [TBL] [Abstract][Full Text] [Related]  

  • 28. A Key Management Protocol Based on the Hash Chain Key Generation for Securing LoRaWAN Networks.
    Hakeem SAA; El-Kader SMA; Kim H
    Sensors (Basel); 2021 Aug; 21(17):. PubMed ID: 34502729
    [TBL] [Abstract][Full Text] [Related]  

  • 29. Advanced encryption schemes in multi-tier heterogeneous internet of things: taxonomy, capabilities, and objectives.
    Alagheband MR; Mashatan A
    J Supercomput; 2022; 78(17):18777-18824. PubMed ID: 35729898
    [TBL] [Abstract][Full Text] [Related]  

  • 30. On-Line Evaluation and Monitoring of Security Features of an RO-Based PUF/TRNG for IoT Devices.
    Rojas-Muñoz LF; Sánchez-Solano S; Martínez-Rodríguez MC; Brox P
    Sensors (Basel); 2023 Apr; 23(8):. PubMed ID: 37112412
    [TBL] [Abstract][Full Text] [Related]  

  • 31. Resource Shared Galois Field Computation for Energy Efficient AES/CRC in IoT Applications.
    Noor SM; John EB
    IEEE Trans Sustain Comput; 2019; 4(4):340-348. PubMed ID: 34307869
    [TBL] [Abstract][Full Text] [Related]  

  • 32. An SHA-3 Hardware Architecture against Failures Based on Hamming Codes and Triple Modular Redundancy.
    Torres-Alvarado A; Morales-Rosales LA; Algredo-Badillo I; López-Huerta F; Lobato-Báez M; López-Pimentel JC
    Sensors (Basel); 2022 Apr; 22(8):. PubMed ID: 35458970
    [TBL] [Abstract][Full Text] [Related]  

  • 33. Secure IoT in the Era of Quantum Computers-Where Are the Bottlenecks?
    Schöffel M; Lauer F; Rheinländer CC; Wehn N
    Sensors (Basel); 2022 Mar; 22(7):. PubMed ID: 35408099
    [TBL] [Abstract][Full Text] [Related]  

  • 34. The Cryptographic Key Distribution System for IoT Systems in the MQTT Environment.
    Furtak J
    Sensors (Basel); 2023 May; 23(11):. PubMed ID: 37299828
    [TBL] [Abstract][Full Text] [Related]  

  • 35. FPGA Implementation for Elliptic Curve Cryptography Algorithm and Circuit with High Efficiency and Low Delay for IoT Applications.
    Wang D; Lin Y; Hu J; Zhang C; Zhong Q
    Micromachines (Basel); 2023 May; 14(5):. PubMed ID: 37241660
    [TBL] [Abstract][Full Text] [Related]  

  • 36. Efficient Hardware Accelerator Design of Non-Linear Optimization Correlative Scan Matching Algorithm in 2D LiDAR SLAM for Mobile Robots.
    Hu A; Yu G; Wang Q; Han D; Zhao S; Liu B; Yu Y; Li Y; Wang C; Zou X
    Sensors (Basel); 2022 Nov; 22(22):. PubMed ID: 36433543
    [TBL] [Abstract][Full Text] [Related]  

  • 37. Memristor-based PUF for lightweight cryptographic randomness.
    Ibrahim HM; Abunahla H; Mohammad B; AlKhzaimi H
    Sci Rep; 2022 May; 12(1):8633. PubMed ID: 35606367
    [TBL] [Abstract][Full Text] [Related]  

  • 38. An RISC-V Processor with Area-Efficient Memristor-Based In-Memory Computing for Hash Algorithm in Blockchain Applications.
    Xue X; Wang C; Liu W; Lv H; Wang M; Zeng X
    Micromachines (Basel); 2019 Aug; 10(8):. PubMed ID: 31426443
    [TBL] [Abstract][Full Text] [Related]  

  • 39. Lightweight Payload Encryption-Based Authentication Scheme for Advanced Metering Infrastructure Sensor Networks.
    Abosata N; Al-Rubaye S; Inalhan G
    Sensors (Basel); 2022 Jan; 22(2):. PubMed ID: 35062494
    [TBL] [Abstract][Full Text] [Related]  

  • 40. PRISEC: Comparison of Symmetric Key Algorithms for IoT Devices.
    Saraiva DAF; Leithardt VRQ; de Paula D; Sales Mendes A; González GV; Crocker P
    Sensors (Basel); 2019 Oct; 19(19):. PubMed ID: 31590354
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 13.