These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

116 related articles for article (PubMed ID: 37238582)

  • 1. A Kind of (
    Meng D; Li Z; Luo S; Han Z
    Entropy (Basel); 2023 May; 25(5):. PubMed ID: 37238582
    [TBL] [Abstract][Full Text] [Related]  

  • 2. (t, n) Threshold d-Level Quantum Secret Sharing.
    Song XL; Liu YB; Deng HY; Xiao YG
    Sci Rep; 2017 Jul; 7(1):6366. PubMed ID: 28743880
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Multi-Party Quantum Secret Sharing Based on GHZ State.
    Li Z; Jiang X; Liu L
    Entropy (Basel); 2022 Oct; 24(10):. PubMed ID: 37420454
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Multiparty weighted threshold quantum secret sharing based on the Chinese remainder theorem to share quantum information.
    Chou YH; Zeng GJ; Chen XY; Kuo SY
    Sci Rep; 2021 Mar; 11(1):6093. PubMed ID: 33731781
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Enhanced BB84 quantum cryptography protocol for secure communication in wireless body sensor networks for medical applications.
    V AD; V K
    Pers Ubiquitous Comput; 2023; 27(3):875-885. PubMed ID: 33758585
    [TBL] [Abstract][Full Text] [Related]  

  • 6. A New Quantum Multiparty Simultaneous Identity Authentication Protocol with the Classical Third-Party.
    Li X; Zhang K; Zhang L; Zhao X
    Entropy (Basel); 2022 Mar; 24(4):. PubMed ID: 35455145
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Hybrid Quantum Protocols for Secure Multiparty Summation and Multiplication.
    Sutradhar K; Om H
    Sci Rep; 2020 Jun; 10(1):9097. PubMed ID: 32499534
    [TBL] [Abstract][Full Text] [Related]  

  • 8. An Efficient Quantum Secret Sharing Scheme Based on Restricted Threshold Access Structure.
    Li L; Li Z
    Entropy (Basel); 2023 Jan; 25(2):. PubMed ID: 36832630
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Centralized Threshold Key Generation Protocol Based on Shamir Secret Sharing and HMAC Authentication.
    Abdel Hakeem SA; Kim H
    Sensors (Basel); 2022 Jan; 22(1):. PubMed ID: 35009873
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Quantum Secret Sharing Among Four Players Using Multipartite Bound Entanglement of an Optical Field.
    Zhou Y; Yu J; Yan Z; Jia X; Zhang J; Xie C; Peng K
    Phys Rev Lett; 2018 Oct; 121(15):150502. PubMed ID: 30362796
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Secure multiparty quantum computation based on Lagrange unitary operator.
    Song X; Gou R; Wen A
    Sci Rep; 2020 May; 10(1):7921. PubMed ID: 32404969
    [TBL] [Abstract][Full Text] [Related]  

  • 12. An Authentication and Secure Communication Scheme for In-Vehicle Networks Based on SOME/IP.
    Ma B; Yang S; Zuo Z; Zou B; Cao Y; Yan X; Zhou S; Li J
    Sensors (Basel); 2022 Jan; 22(2):. PubMed ID: 35062608
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Secure Authentication Protocol for Wireless Sensor Networks in Vehicular Communications.
    Yu S; Lee J; Lee K; Park K; Park Y
    Sensors (Basel); 2018 Sep; 18(10):. PubMed ID: 30248898
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Standard (3, 5)-threshold quantum secret sharing by maximally entangled 6-qubit states.
    Long Y; Zhang C; Sun Z
    Sci Rep; 2021 Nov; 11(1):22649. PubMed ID: 34811381
    [TBL] [Abstract][Full Text] [Related]  

  • 15. A Semi-Quantum Secret-Sharing Protocol with a High Channel Capacity.
    Tian Y; Bian G; Chang J; Tang Y; Li J; Ye C
    Entropy (Basel); 2023 Apr; 25(5):. PubMed ID: 37238497
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Enhanced quantum secret sharing protocol for anonymous secure communication utilizing W states.
    Li GD; Cheng WC; Wang QL; Cheng L; Mao Y; Jia HY
    iScience; 2024 Jun; 27(6):109836. PubMed ID: 38770141
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Enhancing Security in ZigBee Wireless Sensor Networks: A New Approach and Mutual Authentication Scheme for D2D Communication.
    Allakany A; Saber A; Mostafa SM; Alsabaan M; Ibrahem MI; Elwahsh H
    Sensors (Basel); 2023 Jun; 23(12):. PubMed ID: 37420868
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Novel Threshold Changeable Secret Sharing Schemes Based on Polynomial Interpolation.
    Yuan L; Li M; Guo C; Choo KR; Ren Y
    PLoS One; 2016; 11(10):e0165512. PubMed ID: 27792784
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Differential phase shift quantum secret sharing using a twin field.
    Gu J; Cao XY; Yin HL; Chen ZB
    Opt Express; 2021 Mar; 29(6):9165-9173. PubMed ID: 33820349
    [TBL] [Abstract][Full Text] [Related]  

  • 20. A Secure Lightweight Three-Factor Authentication Scheme for IoT in Cloud Computing Environment.
    Yu S; Park K; Park Y
    Sensors (Basel); 2019 Aug; 19(16):. PubMed ID: 31430911
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 6.