These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

135 related articles for article (PubMed ID: 36904909)

  • 1. Identity-Based Proxy Re-Encryption Scheme Using Fog Computing and Anonymous Key Generation.
    Lin HY; Tsai TT; Ting PY; Fan YR
    Sensors (Basel); 2023 Mar; 23(5):. PubMed ID: 36904909
    [TBL] [Abstract][Full Text] [Related]  

  • 2. An Improved ID-Based Data Storage Scheme for Fog-Enabled IoT Environments.
    Lin HY; Tsai TT; Ting PY; Chen CC
    Sensors (Basel); 2022 Jun; 22(11):. PubMed ID: 35684844
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Revocable and Fog-Enabled Proxy Re-Encryption Scheme for IoT Environments.
    Lin HY; Chen PR
    Sensors (Basel); 2024 Sep; 24(19):. PubMed ID: 39409330
    [TBL] [Abstract][Full Text] [Related]  

  • 4. A Hybrid Scheme for Fine-Grained Search and Access Authorization in Fog Computing Environment.
    Xiao M; Zhou J; Liu X; Jiang M
    Sensors (Basel); 2017 Jun; 17(6):. PubMed ID: 28629131
    [TBL] [Abstract][Full Text] [Related]  

  • 5. A Ring Learning with Errors-Based Ciphertext-Policy Attribute-Based Proxy Re-Encryption Scheme for Secure Big Data Sharing in Cloud Environment.
    Li J; Peng J; Qiao Z
    Big Data; 2024 Oct; 12(5):357-366. PubMed ID: 35417273
    [TBL] [Abstract][Full Text] [Related]  

  • 6. An Improved Proxy Re-Encryption Scheme for IoT-Based Data Outsourcing Services in Clouds.
    Lin HY; Hung YM
    Sensors (Basel); 2020 Dec; 21(1):. PubMed ID: 33374340
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Backward Compatible Identity-Based Encryption.
    Kim J
    Sensors (Basel); 2023 Apr; 23(9):. PubMed ID: 37177384
    [TBL] [Abstract][Full Text] [Related]  

  • 8. A Lattice-Based Homomorphic Proxy Re-Encryption Scheme with Strong Anti-Collusion for Cloud Computing.
    Li J; Qiao Z; Zhang K; Cui C
    Sensors (Basel); 2021 Jan; 21(1):. PubMed ID: 33406662
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Secure medical information sharing in cloud computing.
    Shao Z; Yang B; Zhang W; Zhao Y; Wu Z; Miao M
    Technol Health Care; 2015; 23 Suppl 1():S133-7. PubMed ID: 26410315
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Multi-sensor network tracking research utilizing searchable encryption algorithm in the cloud computing environment.
    Sun X; Li S
    PeerJ Comput Sci; 2023; 9():e1433. PubMed ID: 37409083
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation.
    Xu Q; Tan C; Fan Z; Zhu W; Xiao Y; Cheng F
    Sensors (Basel); 2018 May; 18(5):. PubMed ID: 29772840
    [TBL] [Abstract][Full Text] [Related]  

  • 12. A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing.
    Fan K; Wang J; Wang X; Li H; Yang Y
    Sensors (Basel); 2017 Jul; 17(7):. PubMed ID: 28737733
    [TBL] [Abstract][Full Text] [Related]  

  • 13. An environmental monitoring data sharing scheme based on attribute encryption in cloud-fog computing.
    Yang X; Xi W; Chen A; Wang C
    PLoS One; 2021; 16(9):e0258062. PubMed ID: 34591938
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Efficiently Multi-User Searchable Encryption Scheme with Attribute Revocation and Grant for Cloud Storage.
    Wang S; Zhang X; Zhang Y
    PLoS One; 2016; 11(11):e0167157. PubMed ID: 27898703
    [TBL] [Abstract][Full Text] [Related]  

  • 15. A searchable personal health records framework with fine-grained access control in cloud-fog computing.
    Sun J; Wang X; Wang S; Ren L
    PLoS One; 2018; 13(11):e0207543. PubMed ID: 30496194
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Privacy-Preserving Multi-Receiver Certificateless Broadcast Encryption Scheme with De-Duplication.
    Zhang J; Ou P
    Sensors (Basel); 2019 Jul; 19(15):. PubMed ID: 31370322
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Public Key Encryption with Keyword Search in Cloud: A Survey.
    Zhou Y; Li N; Tian Y; An D; Wang L
    Entropy (Basel); 2020 Apr; 22(4):. PubMed ID: 33286195
    [TBL] [Abstract][Full Text] [Related]  

  • 18. A Secured Proxy-Based Data Sharing Module in IoT Environments Using Blockchain.
    Obour Agyekum KO; Xia Q; Sifah EB; Gao J; Xia H; Du X; Guizani M
    Sensors (Basel); 2019 Mar; 19(5):. PubMed ID: 30862110
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Attribute-based proxy re-encryption with keyword search.
    Shi Y; Liu J; Han Z; Zheng Q; Zhang R; Qiu S
    PLoS One; 2014; 9(12):e116325. PubMed ID: 25549257
    [TBL] [Abstract][Full Text] [Related]  

  • 20. A Fine-Grained Video Encryption Service Based on the Cloud-Fog-Local Architecture for Public and Private Videos.
    Li H; Gu Z; Deng L; Han Y; Yang C; Tian Z
    Sensors (Basel); 2019 Dec; 19(24):. PubMed ID: 31817433
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 7.