These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

139 related articles for article (PubMed ID: 36904888)

  • 1. Elliptic Curve Cryptography Considerations for Securing Automation and SCADA Systems.
    Tidrea A; Korodi A; Silea I
    Sensors (Basel); 2023 Mar; 23(5):. PubMed ID: 36904888
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Cryptographic Considerations for Automation and SCADA Systems Using Trusted Platform Modules.
    Tidrea A; Korodi A; Silea I
    Sensors (Basel); 2019 Sep; 19(19):. PubMed ID: 31569636
    [TBL] [Abstract][Full Text] [Related]  

  • 3. TTAS: Trusted Token Authentication Service of Securing SCADA Network in Energy Management System for Industrial Internet of Things.
    Yang YS; Lee SH; Chen WC; Yang CS; Huang YM; Hou TW
    Sensors (Basel); 2021 Apr; 21(8):. PubMed ID: 33920332
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Design and Development of Layered Security: Future Enhancements and Directions in Transmission.
    Shahzad A; Lee M; Kim S; Kim K; Choi JY; Cho Y; Lee KK
    Sensors (Basel); 2016 Jan; 16(1):. PubMed ID: 26751443
    [TBL] [Abstract][Full Text] [Related]  

  • 5. A Role-Based Access Control Model in Modbus SCADA Systems. A Centralized Model Approach.
    Figueroa-Lorenzo S; Añorga J; Arrizabalaga S
    Sensors (Basel); 2019 Oct; 19(20):. PubMed ID: 31615147
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Unified Compact ECC-AES Co-Processor with Group-Key Support for IoT Devices in Wireless Sensor Networks.
    Parrilla L; Castillo E; López-Ramos JA; Álvarez-Bermejo JA; García A; Morales DP
    Sensors (Basel); 2018 Jan; 18(1):. PubMed ID: 29337921
    [TBL] [Abstract][Full Text] [Related]  

  • 7. A Secure and Efficient ECC-Based Scheme for Edge Computing and Internet of Things.
    AlMajed H; AlMogren A
    Sensors (Basel); 2020 Oct; 20(21):. PubMed ID: 33138018
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Secure SCADA communication by using a modified key management scheme.
    Rezai A; Keshavarzi P; Moravej Z
    ISA Trans; 2013 Jul; 52(4):517-24. PubMed ID: 23528753
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Practical Three-Factor Authentication Protocol Based on Elliptic Curve Cryptography for Industrial Internet of Things.
    Zhao X; Li D; Li H
    Sensors (Basel); 2022 Oct; 22(19):. PubMed ID: 36236609
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Optimized ECC Implementation for Secure Communication between Heterogeneous IoT Devices.
    Marin L; Pawlowski MP; Jara A
    Sensors (Basel); 2015 Aug; 15(9):21478-99. PubMed ID: 26343677
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Securing patient data in the healthcare industry: A blockchain-driven protocol with advanced encryption.
    Kunal S; Gandhi P; Rathod D; Amin R; Sharma S
    J Educ Health Promot; 2024; 13():94. PubMed ID: 38726083
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Lightweight Authentication Mechanism for Industrial IoT Environment Combining Elliptic Curve Cryptography and Trusted Token.
    Yang YS; Lee SH; Wang JM; Yang CS; Huang YM; Hou TW
    Sensors (Basel); 2023 May; 23(10):. PubMed ID: 37430882
    [TBL] [Abstract][Full Text] [Related]  

  • 13. FPGA Implementation for Elliptic Curve Cryptography Algorithm and Circuit with High Efficiency and Low Delay for IoT Applications.
    Wang D; Lin Y; Hu J; Zhang C; Zhong Q
    Micromachines (Basel); 2023 May; 14(5):. PubMed ID: 37241660
    [TBL] [Abstract][Full Text] [Related]  

  • 14. A Secure, Intelligent, and Smart-Sensing Approach for Industrial System Automation and Transmission over Unsecured Wireless Networks.
    Shahzad A; Lee M; Xiong NN; Jeong G; Lee YK; Choi JY; Mahesar AW; Ahmad I
    Sensors (Basel); 2016 Mar; 16(3):. PubMed ID: 26950129
    [TBL] [Abstract][Full Text] [Related]  

  • 15. A Practical Evaluation of a High-Security Energy-Efficient Gateway for IoT Fog Computing Applications.
    Suárez-Albela M; Fernández-Caramés TM; Fraga-Lamas P; Castedo L
    Sensors (Basel); 2017 Aug; 17(9):. PubMed ID: 28850104
    [TBL] [Abstract][Full Text] [Related]  

  • 16. An Improved Authentication and Security on Efficient Generalized Group Key Agreement Using Hyper Elliptic Curve Based Public Key Cryptography for IoT Health Care System.
    Kavitha S; Alphonse PJA; Reddy YV
    J Med Syst; 2019 Jul; 43(8):260. PubMed ID: 31267216
    [TBL] [Abstract][Full Text] [Related]  

  • 17. A Secure Pseudonym-Based Conditional Privacy-Preservation Authentication Scheme in Vehicular Ad Hoc Networks.
    Al-Shareeda MA; Anbar M; Manickam S; Hasbullah IH
    Sensors (Basel); 2022 Feb; 22(5):. PubMed ID: 35270843
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Security Framework for Network-Based Manufacturing Systems with Personalized Customization: An Industry 4.0 Approach.
    Hammad M; Jillani RM; Ullah S; Namoun A; Tufail A; Kim KH; Shah H
    Sensors (Basel); 2023 Aug; 23(17):. PubMed ID: 37688011
    [TBL] [Abstract][Full Text] [Related]  

  • 19. iTrust-A Trustworthy and Efficient Mapping Scheme in Elliptic Curve Cryptography.
    Almajed H; Almogren A; Alabdulkareem M
    Sensors (Basel); 2020 Nov; 20(23):. PubMed ID: 33266009
    [TBL] [Abstract][Full Text] [Related]  

  • 20. A stacked deep learning approach to cyber-attacks detection in industrial systems: application to power system and gas pipeline systems.
    Wang W; Harrou F; Bouyeddou B; Senouci SM; Sun Y
    Cluster Comput; 2022; 25(1):561-578. PubMed ID: 34629940
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 7.