These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

155 related articles for article (PubMed ID: 37960442)

  • 1. Post-Quantum Security: Opportunities and Challenges.
    Li S; Chen Y; Chen L; Liao J; Kuang C; Li K; Liang W; Xiong N
    Sensors (Basel); 2023 Oct; 23(21):. PubMed ID: 37960442
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms.
    Farooq S; Altaf A; Iqbal F; Thompson EB; Vargas DLR; Díez IT; Ashraf I
    Sensors (Basel); 2023 Jun; 23(12):. PubMed ID: 37420546
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Experimental quantum secure network with digital signatures and encryption.
    Yin HL; Fu Y; Li CL; Weng CX; Li BH; Gu J; Lu YS; Huang S; Chen ZB
    Natl Sci Rev; 2023 Apr; 10(4):nwac228. PubMed ID: 37168101
    [TBL] [Abstract][Full Text] [Related]  

  • 4. An improved NFC device authentication protocol.
    Lu HJ; Liu D
    PLoS One; 2021; 16(8):e0256367. PubMed ID: 34398903
    [TBL] [Abstract][Full Text] [Related]  

  • 5. A novel image encryption scheme based on quantum dynamical spinning and rotations.
    Khan M; Waseem HM
    PLoS One; 2018; 13(11):e0206460. PubMed ID: 30452455
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Measurement-device-independent quantum communication without encryption.
    Niu PH; Zhou ZR; Lin ZS; Sheng YB; Yin LG; Long GL
    Sci Bull (Beijing); 2018 Oct; 63(20):1345-1350. PubMed ID: 36658905
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Password authenticated key exchange-based on Kyber for mobile devices.
    Seyhan K; Akleylek S; Dursun AF
    PeerJ Comput Sci; 2024; 10():e1960. PubMed ID: 38660167
    [TBL] [Abstract][Full Text] [Related]  

  • 8. A quantum encryption design featuring confusion, diffusion, and mode of operation.
    Hu Z; Kais S
    Sci Rep; 2021 Dec; 11(1):23774. PubMed ID: 34893658
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Information encoding and encryption in acoustic analogues of qubits.
    Ige AS; Cavalluzzi D; Djordjevic IB; Runge K; Deymier PA
    Sci Rep; 2024 Jun; 14(1):14934. PubMed ID: 38942907
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Security Requirements and Challenges of 6G Technologies and Applications.
    Abdel Hakeem SA; Hussein HH; Kim H
    Sensors (Basel); 2022 Mar; 22(5):. PubMed ID: 35271113
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Highly Trustworthy In-Sensor Cryptography for Image Encryption and Authentication.
    Shao B; Wan T; Liao F; Kim BJ; Chen J; Guo J; Ma S; Ahn JH; Chai Y
    ACS Nano; 2023 Jun; 17(11):10291-10299. PubMed ID: 37186522
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Efficient lattice-based revocable attribute-based encryption against decryption key exposure for cloud file sharing.
    Huang B; Gao J; Li X
    J Cloud Comput (Heidelb); 2023; 12(1):37. PubMed ID: 36937653
    [TBL] [Abstract][Full Text] [Related]  

  • 13. A Novel Cipher-Based Data Encryption with Galois Field Theory.
    Hazzazi MM; Attuluri S; Bassfar Z; Joshi K
    Sensors (Basel); 2023 Mar; 23(6):. PubMed ID: 36991997
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Data and Service Security of GNSS Sensors Integrated with Cryptographic Module.
    Xu C; Zhang J; Zhang Z; Hou J; Wen X
    Micromachines (Basel); 2023 Feb; 14(2):. PubMed ID: 36838153
    [TBL] [Abstract][Full Text] [Related]  

  • 15. [Security services: an overview of the French legislation on cryptography].
    Quantin C; Kerkri E; Allaert FA; Bouzelat H; Dusserre L
    Rev Epidemiol Sante Publique; 2000 Jan; 48(1):81-7. PubMed ID: 10740087
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Performance comparison between Chaos and quantum-chaos based image encryption techniques.
    Kumari M; Gupta S
    Multimed Tools Appl; 2021; 80(24):33213-33255. PubMed ID: 34413701
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Optimization of a Deep Learning Algorithm for Security Protection of Big Data from Video Images.
    Geng Q; Yan H; Lu X
    Comput Intell Neurosci; 2022; 2022():3394475. PubMed ID: 35300398
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Meeting the security requirements of electronic medical records in the ERA of high-speed computing.
    Alanazi HO; Zaidan AA; Zaidan BB; Kiah ML; Al-Bakri SH
    J Med Syst; 2015 Jan; 39(1):165. PubMed ID: 25481568
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Transitioning organizations to post-quantum cryptography.
    Joseph D; Misoczki R; Manzano M; Tricot J; Pinuaga FD; Lacombe O; Leichenauer S; Hidary J; Venables P; Hansen R
    Nature; 2022 May; 605(7909):237-243. PubMed ID: 35546191
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Hybrid Technique for Cyber-Physical Security in Cloud-Based Smart Industries.
    Garg D; Rani S; Herencsar N; Verma S; Wozniak M; Ijaz MF
    Sensors (Basel); 2022 Jun; 22(12):. PubMed ID: 35746411
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 8.