BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

191 related articles for article (PubMed ID: 37177384)

  • 1. Backward Compatible Identity-Based Encryption.
    Kim J
    Sensors (Basel); 2023 Apr; 23(9):. PubMed ID: 37177384
    [TBL] [Abstract][Full Text] [Related]  

  • 2. A Hybrid Scheme for Fine-Grained Search and Access Authorization in Fog Computing Environment.
    Xiao M; Zhou J; Liu X; Jiang M
    Sensors (Basel); 2017 Jun; 17(6):. PubMed ID: 28629131
    [TBL] [Abstract][Full Text] [Related]  

  • 3. (Inner-Product) Functional Encryption with Updatable Ciphertexts.
    Cini V; Ramacher S; Slamanig D; Striecks C; Tairi E
    J Cryptol; 2024; 37(1):8. PubMed ID: 38274003
    [TBL] [Abstract][Full Text] [Related]  

  • 4. A keyword searchable attribute-based encryption scheme with attribute update for cloud storage.
    Wang S; Ye J; Zhang Y
    PLoS One; 2018; 13(5):e0197318. PubMed ID: 29795577
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Analysis of an ABE Scheme with Verifiable Outsourced Decryption.
    Liao Y; He Y; Li F; Jiang S; Zhou S
    Sensors (Basel); 2018 Jan; 18(1):. PubMed ID: 29320418
    [TBL] [Abstract][Full Text] [Related]  

  • 6. A Provably Secure IBE Transformation Model for PKC Using Conformable Chebyshev Chaotic Maps under Human-Centered IoT Environments.
    Meshram C; Imoize AL; Aljaedi A; Alharbi AR; Jamal SS; Barve SK
    Sensors (Basel); 2021 Oct; 21(21):. PubMed ID: 34770535
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Attribute-based encryption scheme with multi-keyword search and supporting attribute revocation in cloud storage.
    Wang S; Yao L; Zhang Y
    PLoS One; 2018; 13(10):e0205675. PubMed ID: 30312345
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Hybrid Technique for Cyber-Physical Security in Cloud-Based Smart Industries.
    Garg D; Rani S; Herencsar N; Verma S; Wozniak M; Ijaz MF
    Sensors (Basel); 2022 Jun; 22(12):. PubMed ID: 35746411
    [TBL] [Abstract][Full Text] [Related]  

  • 9. A Study on CP-ABE-based Medical Data Sharing System with Key Abuse Prevention and Verifiable Outsourcing in the IoMT Environment.
    Hwang YW; Lee IY
    Sensors (Basel); 2020 Aug; 20(17):. PubMed ID: 32878202
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Efficient lattice-based revocable attribute-based encryption against decryption key exposure for cloud file sharing.
    Huang B; Gao J; Li X
    J Cloud Comput (Heidelb); 2023; 12(1):37. PubMed ID: 36937653
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Traceable ciphertext-policy attribute-based encryption scheme with attribute level user revocation for cloud storage.
    Wang S; Guo K; Zhang Y
    PLoS One; 2018; 13(9):e0203225. PubMed ID: 30212473
    [TBL] [Abstract][Full Text] [Related]  

  • 12. A generic construction for revocable identity-based encryption with subset difference methods.
    Lee K
    PLoS One; 2020; 15(9):e0239053. PubMed ID: 32946491
    [TBL] [Abstract][Full Text] [Related]  

  • 13. A revocable storage CP-ABE scheme with constant ciphertext length in cloud storage.
    Zhao Y; Xie X; Zhang X; Ding Y
    Math Biosci Eng; 2019 May; 16(5):4229-4249. PubMed ID: 31499660
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Identity-Based Encryption with Filtered Equality Test for Smart City Applications.
    Ming Y; Wang E
    Sensors (Basel); 2019 Jul; 19(14):. PubMed ID: 31295922
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Searchable and revocable multi-data owner attribute-based encryption scheme with hidden policy in cloud storage.
    Wang S; Gao T; Zhang Y
    PLoS One; 2018; 13(11):e0206126. PubMed ID: 30383840
    [TBL] [Abstract][Full Text] [Related]  

  • 16. A Ring Learning with Errors-Based Ciphertext-Policy Attribute-Based Proxy Re-Encryption Scheme for Secure Big Data Sharing in Cloud Environment.
    Li J; Peng J; Qiao Z
    Big Data; 2022 Apr; ():. PubMed ID: 35417273
    [TBL] [Abstract][Full Text] [Related]  

  • 17. A revocable attribute-based encryption EHR sharing scheme with multiple authorities in blockchain.
    Yang X; Li W; Fan K
    Peer Peer Netw Appl; 2023; 16(1):107-125. PubMed ID: 36188111
    [TBL] [Abstract][Full Text] [Related]  

  • 18. A Secured Proxy-Based Data Sharing Module in IoT Environments Using Blockchain.
    Obour Agyekum KO; Xia Q; Sifah EB; Gao J; Xia H; Du X; Guizani M
    Sensors (Basel); 2019 Mar; 19(5):. PubMed ID: 30862110
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Adaptively Secure Efficient (H)IBE over Ideal Lattice with Short Parameters.
    Zhang Y; Liu Y; Guo Y; Zheng S; Wang L
    Entropy (Basel); 2020 Nov; 22(11):. PubMed ID: 33287014
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Identity-Based Proxy Re-Encryption Scheme Using Fog Computing and Anonymous Key Generation.
    Lin HY; Tsai TT; Ting PY; Fan YR
    Sensors (Basel); 2023 Mar; 23(5):. PubMed ID: 36904909
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 10.