These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

148 related articles for article (PubMed ID: 36662805)

  • 21. Cache-Based Privacy Preserving Solution for Location and Content Protection in Location-Based Services.
    Cui Y; Gao F; Li W; Shi Y; Zhang H; Wen Q; Panaousis E
    Sensors (Basel); 2020 Aug; 20(16):. PubMed ID: 32824808
    [TBL] [Abstract][Full Text] [Related]  

  • 22. An efficient and provable secure revocable identity-based encryption scheme.
    Wang C; Li Y; Xia X; Zheng K
    PLoS One; 2014; 9(9):e106925. PubMed ID: 25238418
    [TBL] [Abstract][Full Text] [Related]  

  • 23. Unbounded and revocable hierarchical identity-based encryption with adaptive security, decryption key exposure resistant, and short public parameters.
    Xing Q; Wang B; Wang X; Tao J
    PLoS One; 2018; 13(4):e0195204. PubMed ID: 29649326
    [TBL] [Abstract][Full Text] [Related]  

  • 24. Multi-message multi-receiver signcryption scheme based on blockchain.
    Yang XD; Wang WJ; Shu B; Li MJ; Liu RX; Wang CF
    Math Biosci Eng; 2023 Sep; 20(10):18146-18172. PubMed ID: 38052552
    [TBL] [Abstract][Full Text] [Related]  

  • 25. Efficient lattice-based revocable attribute-based encryption against decryption key exposure for cloud file sharing.
    Huang B; Gao J; Li X
    J Cloud Comput (Heidelb); 2023; 12(1):37. PubMed ID: 36937653
    [TBL] [Abstract][Full Text] [Related]  

  • 26. Lightweight user authentication scheme for roaming service in GLOMONET with privacy preserving.
    Kang D; Lee H; Lee Y; Won D
    PLoS One; 2021; 16(2):e0247441. PubMed ID: 33635893
    [TBL] [Abstract][Full Text] [Related]  

  • 27. Protection of Location Privacy Based on Distributed Collaborative Recommendations.
    Wang P; Yang J; Zhang JP
    PLoS One; 2016; 11(9):e0163053. PubMed ID: 27649308
    [TBL] [Abstract][Full Text] [Related]  

  • 28. Privacy-preserving approximate GWAS computation based on homomorphic encryption.
    Kim D; Son Y; Kim D; Kim A; Hong S; Cheon JH
    BMC Med Genomics; 2020 Jul; 13(Suppl 7):77. PubMed ID: 32693801
    [TBL] [Abstract][Full Text] [Related]  

  • 29. Combinatorial Subset Difference-IoT-Friendly Subset Representation and Broadcast Encryption.
    Lee J; Lee S; Kim J; Oh H
    Sensors (Basel); 2020 Jun; 20(11):. PubMed ID: 32498272
    [TBL] [Abstract][Full Text] [Related]  

  • 30. BRISK: Dynamic Encryption Based Cipher for Long Term Security.
    Dwivedi AD
    Sensors (Basel); 2021 Aug; 21(17):. PubMed ID: 34502635
    [TBL] [Abstract][Full Text] [Related]  

  • 31. An improved efficient anonymous authentication with conditional privacy-preserving scheme for VANETs.
    Cahyadi EF; Hwang MS
    PLoS One; 2021; 16(9):e0257044. PubMed ID: 34506565
    [TBL] [Abstract][Full Text] [Related]  

  • 32. Research on Information Leakage Tracking Algorithms in Online Social Networks.
    Xiong J; Huang H
    Comput Intell Neurosci; 2022; 2022():5634385. PubMed ID: 36238673
    [TBL] [Abstract][Full Text] [Related]  

  • 33. Searchable and revocable multi-data owner attribute-based encryption scheme with hidden policy in cloud storage.
    Wang S; Gao T; Zhang Y
    PLoS One; 2018; 13(11):e0206126. PubMed ID: 30383840
    [TBL] [Abstract][Full Text] [Related]  

  • 34. CP-ABE Based Privacy-Preserving User Profile Matching in Mobile Social Networks.
    Cui W; Du C; Chen J
    PLoS One; 2016; 11(6):e0157933. PubMed ID: 27337001
    [TBL] [Abstract][Full Text] [Related]  

  • 35. Revocable and Fog-Enabled Proxy Re-Encryption Scheme for IoT Environments.
    Lin HY; Chen PR
    Sensors (Basel); 2024 Sep; 24(19):. PubMed ID: 39409330
    [TBL] [Abstract][Full Text] [Related]  

  • 36. Privacy preserving probabilistic record linkage (P3RL): a novel method for linking existing health-related data and maintaining participant confidentiality.
    Schmidlin K; Clough-Gorr KM; Spoerri A;
    BMC Med Res Methodol; 2015 May; 15():46. PubMed ID: 26024886
    [TBL] [Abstract][Full Text] [Related]  

  • 37. Revocable identity-based proxy re-signature against signing key exposure.
    Yang X; Chen C; Ma T; Wang J; Wang C
    PLoS One; 2018; 13(3):e0194783. PubMed ID: 29579125
    [TBL] [Abstract][Full Text] [Related]  

  • 38. Certificateless broadcast signcryption scheme supporting equality test in smart grid.
    Niu S; Dong R; Fang L
    PLoS One; 2023; 18(9):e0290666. PubMed ID: 37676890
    [TBL] [Abstract][Full Text] [Related]  

  • 39. Towards Secure Big Data Analysis via Fully Homomorphic Encryption Algorithms.
    Hamza R; Hassan A; Ali A; Bashir MB; Alqhtani SM; Tawfeeg TM; Yousif A
    Entropy (Basel); 2022 Apr; 24(4):. PubMed ID: 35455182
    [TBL] [Abstract][Full Text] [Related]  

  • 40. Multi-Chaos-Based Lightweight Image Encryption-Compression for Secure Occupancy Monitoring.
    Ghadi YY; Alsuhibany SA; Ahmad J; Kumar H; Boulila W; Alsaedi M; Khan K; Bhatti SA
    J Healthc Eng; 2022; 2022():7745132. PubMed ID: 36397885
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 8.