These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
3. Experimental quantum secure network with digital signatures and encryption. Yin HL; Fu Y; Li CL; Weng CX; Li BH; Gu J; Lu YS; Huang S; Chen ZB Natl Sci Rev; 2023 Apr; 10(4):nwac228. PubMed ID: 37168101 [TBL] [Abstract][Full Text] [Related]
4. An improved NFC device authentication protocol. Lu HJ; Liu D PLoS One; 2021; 16(8):e0256367. PubMed ID: 34398903 [TBL] [Abstract][Full Text] [Related]
5. A novel image encryption scheme based on quantum dynamical spinning and rotations. Khan M; Waseem HM PLoS One; 2018; 13(11):e0206460. PubMed ID: 30452455 [TBL] [Abstract][Full Text] [Related]
6. Measurement-device-independent quantum communication without encryption. Niu PH; Zhou ZR; Lin ZS; Sheng YB; Yin LG; Long GL Sci Bull (Beijing); 2018 Oct; 63(20):1345-1350. PubMed ID: 36658905 [TBL] [Abstract][Full Text] [Related]
7. Password authenticated key exchange-based on Kyber for mobile devices. Seyhan K; Akleylek S; Dursun AF PeerJ Comput Sci; 2024; 10():e1960. PubMed ID: 38660167 [TBL] [Abstract][Full Text] [Related]
8. A quantum encryption design featuring confusion, diffusion, and mode of operation. Hu Z; Kais S Sci Rep; 2021 Dec; 11(1):23774. PubMed ID: 34893658 [TBL] [Abstract][Full Text] [Related]
9. Information encoding and encryption in acoustic analogues of qubits. Ige AS; Cavalluzzi D; Djordjevic IB; Runge K; Deymier PA Sci Rep; 2024 Jun; 14(1):14934. PubMed ID: 38942907 [TBL] [Abstract][Full Text] [Related]
10. Security Requirements and Challenges of 6G Technologies and Applications. Abdel Hakeem SA; Hussein HH; Kim H Sensors (Basel); 2022 Mar; 22(5):. PubMed ID: 35271113 [TBL] [Abstract][Full Text] [Related]
11. Highly Trustworthy In-Sensor Cryptography for Image Encryption and Authentication. Shao B; Wan T; Liao F; Kim BJ; Chen J; Guo J; Ma S; Ahn JH; Chai Y ACS Nano; 2023 Jun; 17(11):10291-10299. PubMed ID: 37186522 [TBL] [Abstract][Full Text] [Related]
12. Efficient lattice-based revocable attribute-based encryption against decryption key exposure for cloud file sharing. Huang B; Gao J; Li X J Cloud Comput (Heidelb); 2023; 12(1):37. PubMed ID: 36937653 [TBL] [Abstract][Full Text] [Related]
13. A Novel Cipher-Based Data Encryption with Galois Field Theory. Hazzazi MM; Attuluri S; Bassfar Z; Joshi K Sensors (Basel); 2023 Mar; 23(6):. PubMed ID: 36991997 [TBL] [Abstract][Full Text] [Related]
14. Data and Service Security of GNSS Sensors Integrated with Cryptographic Module. Xu C; Zhang J; Zhang Z; Hou J; Wen X Micromachines (Basel); 2023 Feb; 14(2):. PubMed ID: 36838153 [TBL] [Abstract][Full Text] [Related]
15. [Security services: an overview of the French legislation on cryptography]. Quantin C; Kerkri E; Allaert FA; Bouzelat H; Dusserre L Rev Epidemiol Sante Publique; 2000 Jan; 48(1):81-7. PubMed ID: 10740087 [TBL] [Abstract][Full Text] [Related]
16. Performance comparison between Chaos and quantum-chaos based image encryption techniques. Kumari M; Gupta S Multimed Tools Appl; 2021; 80(24):33213-33255. PubMed ID: 34413701 [TBL] [Abstract][Full Text] [Related]
17. Optimization of a Deep Learning Algorithm for Security Protection of Big Data from Video Images. Geng Q; Yan H; Lu X Comput Intell Neurosci; 2022; 2022():3394475. PubMed ID: 35300398 [TBL] [Abstract][Full Text] [Related]
18. Meeting the security requirements of electronic medical records in the ERA of high-speed computing. Alanazi HO; Zaidan AA; Zaidan BB; Kiah ML; Al-Bakri SH J Med Syst; 2015 Jan; 39(1):165. PubMed ID: 25481568 [TBL] [Abstract][Full Text] [Related]
19. Transitioning organizations to post-quantum cryptography. Joseph D; Misoczki R; Manzano M; Tricot J; Pinuaga FD; Lacombe O; Leichenauer S; Hidary J; Venables P; Hansen R Nature; 2022 May; 605(7909):237-243. PubMed ID: 35546191 [TBL] [Abstract][Full Text] [Related]