These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

156 related articles for article (PubMed ID: 37177587)

  • 1. EVOAC-HP: An Efficient and Verifiable Outsourced Access Control Scheme with Hidden Policy.
    Ma H; Zhou D; Li P; Wang X
    Sensors (Basel); 2023 Apr; 23(9):. PubMed ID: 37177587
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Analysis of an ABE Scheme with Verifiable Outsourced Decryption.
    Liao Y; He Y; Li F; Jiang S; Zhou S
    Sensors (Basel); 2018 Jan; 18(1):. PubMed ID: 29320418
    [TBL] [Abstract][Full Text] [Related]  

  • 3. A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing.
    Fan K; Wang J; Wang X; Li H; Yang Y
    Sensors (Basel); 2017 Jul; 17(7):. PubMed ID: 28737733
    [TBL] [Abstract][Full Text] [Related]  

  • 4. A Secure and Lightweight Fine-Grained Data Sharing Scheme for Mobile Cloud Computing.
    Li H; Lan C; Fu X; Wang C; Li F; Guo H
    Sensors (Basel); 2020 Aug; 20(17):. PubMed ID: 32825602
    [TBL] [Abstract][Full Text] [Related]  

  • 5. A revocable storage CP-ABE scheme with constant ciphertext length in cloud storage.
    Zhao Y; Xie X; Zhang X; Ding Y
    Math Biosci Eng; 2019 May; 16(5):4229-4249. PubMed ID: 31499660
    [TBL] [Abstract][Full Text] [Related]  

  • 6. A Ring Learning with Errors-Based Ciphertext-Policy Attribute-Based Proxy Re-Encryption Scheme for Secure Big Data Sharing in Cloud Environment.
    Li J; Peng J; Qiao Z
    Big Data; 2024 Oct; 12(5):357-366. PubMed ID: 35417273
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Traceable ciphertext-policy attribute-based encryption scheme with attribute level user revocation for cloud storage.
    Wang S; Guo K; Zhang Y
    PLoS One; 2018; 13(9):e0203225. PubMed ID: 30212473
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Secured and Privacy-Preserving Multi-Authority Access Control System for Cloud-Based Healthcare Data Sharing.
    Gupta R; Kanungo P; Dagdee N; Madhu G; Sahoo KS; Jhanjhi NZ; Masud M; Almalki NS; AlZain MA
    Sensors (Basel); 2023 Feb; 23(5):. PubMed ID: 36904822
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Online/Offline MA-CP-ABE with Cryptographic Reverse Firewalls for IoT.
    Li J; Fan Y; Bian X; Yuan Q
    Entropy (Basel); 2023 Apr; 25(4):. PubMed ID: 37190404
    [TBL] [Abstract][Full Text] [Related]  

  • 10. A Study on CP-ABE-based Medical Data Sharing System with Key Abuse Prevention and Verifiable Outsourcing in the IoMT Environment.
    Hwang YW; Lee IY
    Sensors (Basel); 2020 Aug; 20(17):. PubMed ID: 32878202
    [TBL] [Abstract][Full Text] [Related]  

  • 11. An Access Control Scheme Based on Blockchain and Ciphertext Policy-Attribute Based Encryption.
    Hu R; Ma Z; Li L; Zuo P; Li X; Wei J; Liu S
    Sensors (Basel); 2023 Sep; 23(19):. PubMed ID: 37836868
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Blockchain-Based Access Control Scheme for Secure Shared Personal Health Records over Decentralised Storage.
    Hussien HM; Yasin SM; Udzir NI; Ninggal MIH
    Sensors (Basel); 2021 Apr; 21(7):. PubMed ID: 33918266
    [TBL] [Abstract][Full Text] [Related]  

  • 13. CESCR: CP-ABE for efficient and secure sharing of data in collaborative ehealth with revocation and no dummy attribute.
    Edemacu K; Jang B; Kim JW
    PLoS One; 2021; 16(5):e0250992. PubMed ID: 33974672
    [TBL] [Abstract][Full Text] [Related]  

  • 14. EPPS: Efficient and Privacy-Preserving Personal Health Information Sharing in Mobile Healthcare Social Networks.
    Jiang S; Zhu X; Wang L
    Sensors (Basel); 2015 Sep; 15(9):22419-38. PubMed ID: 26404300
    [TBL] [Abstract][Full Text] [Related]  

  • 15. A Secured Proxy-Based Data Sharing Module in IoT Environments Using Blockchain.
    Obour Agyekum KO; Xia Q; Sifah EB; Gao J; Xia H; Du X; Guizani M
    Sensors (Basel); 2019 Mar; 19(5):. PubMed ID: 30862110
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Efficient and accountable anti-leakage attribute-based encryption scheme for cloud storage.
    Yan L; Wang G; Feng H; Liu P; Gao H; Zhang W; Hu H; Pan F
    Heliyon; 2024 Jun; 10(12):e32404. PubMed ID: 38975165
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Searchable and revocable multi-data owner attribute-based encryption scheme with hidden policy in cloud storage.
    Wang S; Gao T; Zhang Y
    PLoS One; 2018; 13(11):e0206126. PubMed ID: 30383840
    [TBL] [Abstract][Full Text] [Related]  

  • 18. A Hybrid Scheme for Fine-Grained Search and Access Authorization in Fog Computing Environment.
    Xiao M; Zhou J; Liu X; Jiang M
    Sensors (Basel); 2017 Jun; 17(6):. PubMed ID: 28629131
    [TBL] [Abstract][Full Text] [Related]  

  • 19. A privacy-preserving blockchain-based tracing model for virus-infected people in cloud.
    Qin C; Wu L; Meng W; Xu Z; Li S; Wang H
    Expert Syst Appl; 2023 Jan; 211():118545. PubMed ID: 35996556
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Enabling efficient traceable and revocable time-based data sharing in smart city.
    Zhang J; Li T; Jiang Q; Ma J
    EURASIP J Wirel Commun Netw; 2022; 2022(1):3. PubMed ID: 35058976
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 8.