These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

152 related articles for article (PubMed ID: 37238513)

  • 1. An SSL-PUF Based Access Authentication and Key Distribution Scheme for the Space-Air-Ground Integrated Network.
    Xu L; Wu H; Xie J; Yuan Q; Sun Y; Shi G; Luo S
    Entropy (Basel); 2023 May; 25(5):. PubMed ID: 37238513
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Provably Secure Mutual Authentication and Key Agreement Scheme Using PUF in Internet of Drones Deployments.
    Park Y; Ryu D; Kwon D; Park Y
    Sensors (Basel); 2023 Feb; 23(4):. PubMed ID: 36850634
    [TBL] [Abstract][Full Text] [Related]  

  • 3. A Secure Secret Key Agreement Scheme among Multiple Twinning Superlattice PUF Holders.
    Liu J; Xie J; Zhang J; Liu B; Chen X; Feng H
    Sensors (Basel); 2023 May; 23(10):. PubMed ID: 37430626
    [TBL] [Abstract][Full Text] [Related]  

  • 4. 5G-AKA-FS: A 5G Authentication and Key Agreement Protocol for Forward Secrecy.
    You I; Kim G; Shin S; Kwon H; Kim J; Baek J
    Sensors (Basel); 2023 Dec; 24(1):. PubMed ID: 38203020
    [TBL] [Abstract][Full Text] [Related]  

  • 5. A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks.
    Chen H; Ge L; Xie L
    Sensors (Basel); 2015 Jul; 15(7):17057-75. PubMed ID: 26184224
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Designing secure PUF-based authentication protocols for constrained environments.
    Lee SW; Safkhani M; Le Q; Ahmed OH; Hosseinzadeh M; Rahmani AM; Bagheri N
    Sci Rep; 2023 Dec; 13(1):21702. PubMed ID: 38066003
    [TBL] [Abstract][Full Text] [Related]  

  • 7. An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System.
    Li CT; Wu TY; Chen CL; Lee CC; Chen CM
    Sensors (Basel); 2017 Jun; 17(7):. PubMed ID: 28644381
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Practical Three-Factor Authentication Protocol Based on Elliptic Curve Cryptography for Industrial Internet of Things.
    Zhao X; Li D; Li H
    Sensors (Basel); 2022 Oct; 22(19):. PubMed ID: 36236609
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Secure Authentication Protocol for Wireless Sensor Networks in Vehicular Communications.
    Yu S; Lee J; Lee K; Park K; Park Y
    Sensors (Basel); 2018 Sep; 18(10):. PubMed ID: 30248898
    [TBL] [Abstract][Full Text] [Related]  

  • 10. A Secure Lightweight Three-Factor Authentication Scheme for IoT in Cloud Computing Environment.
    Yu S; Park K; Park Y
    Sensors (Basel); 2019 Aug; 19(16):. PubMed ID: 31430911
    [TBL] [Abstract][Full Text] [Related]  

  • 11. On the Security of a PUF-Based Authentication and Key Exchange Protocol for IoT Devices.
    Sun DZ; Gao YN; Tian Y
    Sensors (Basel); 2023 Jul; 23(14):. PubMed ID: 37514853
    [TBL] [Abstract][Full Text] [Related]  

  • 12. A Novel RFID Authentication Protocol Based on Reconfigurable RRAM PUF.
    Ren Q; Fu X; Wu H; Yang K; Lei D; Xing G; Zhang F
    Micromachines (Basel); 2021 Dec; 12(12):. PubMed ID: 34945410
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Deep PUF: A Highly Reliable DRAM PUF-Based Authentication for IoT Networks Using Deep Convolutional Neural Networks.
    Najafi F; Kaveh M; Martín D; Reza Mosavi M
    Sensors (Basel); 2021 Mar; 21(6):. PubMed ID: 33809161
    [TBL] [Abstract][Full Text] [Related]  

  • 14. An Efficient and Practical Smart Card Based Anonymity Preserving User Authentication Scheme for TMIS using Elliptic Curve Cryptography.
    Amin R; Islam SK; Biswas GP; Khan MK; Kumar N
    J Med Syst; 2015 Nov; 39(11):180. PubMed ID: 26433889
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Centralized Threshold Key Generation Protocol Based on Shamir Secret Sharing and HMAC Authentication.
    Abdel Hakeem SA; Kim H
    Sensors (Basel); 2022 Jan; 22(1):. PubMed ID: 35009873
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Unconditional Authentication Based on Physical Layer Offered Chain Key in Wireless Communication.
    Wang S; Huang K; Xu X; Hu X; Yang J; Jin L
    Entropy (Basel); 2022 Mar; 24(4):. PubMed ID: 35455151
    [TBL] [Abstract][Full Text] [Related]  

  • 17. A Mutual Authentication Framework for Wireless Medical Sensor Networks.
    Srinivas J; Mishra D; Mukhopadhyay S
    J Med Syst; 2017 May; 41(5):80. PubMed ID: 28364358
    [TBL] [Abstract][Full Text] [Related]  

  • 18. On-Demand Anonymous Access and Roaming Authentication Protocols for 6G Satellite-Ground Integrated Networks.
    Tao Y; Du H; Xu J; Su L; Cui B
    Sensors (Basel); 2023 May; 23(11):. PubMed ID: 37299801
    [TBL] [Abstract][Full Text] [Related]  

  • 19. A secure biometrics-based authentication key exchange protocol for multi-server TMIS using ECC.
    Qi M; Chen J; Chen Y
    Comput Methods Programs Biomed; 2018 Oct; 164():101-109. PubMed ID: 30195418
    [TBL] [Abstract][Full Text] [Related]  

  • 20. A New Privacy-Preserving Handover Authentication Scheme for Wireless Networks.
    Wang C; Yuan Y; Wu J
    Sensors (Basel); 2017 Jun; 17(6):. PubMed ID: 28632171
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 8.