These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

113 related articles for article (PubMed ID: 38136531)

  • 21. Complex Conjugated certificateless-based signcryption with differential integrated factor for secured message communication in mobile network.
    Alagarsamy S; Rajagopalan SP
    PLoS One; 2017; 12(10):e0186207. PubMed ID: 29040290
    [TBL] [Abstract][Full Text] [Related]  

  • 22. A Lattice-Based Homomorphic Proxy Re-Encryption Scheme with Strong Anti-Collusion for Cloud Computing.
    Li J; Qiao Z; Zhang K; Cui C
    Sensors (Basel); 2021 Jan; 21(1):. PubMed ID: 33406662
    [TBL] [Abstract][Full Text] [Related]  

  • 23. An Identity-Based Anti-Quantum Privacy-Preserving Blind Authentication in Wireless Sensor Networks.
    Zhu H; Tan YA; Zhu L; Wang X; Zhang Q; Li Y
    Sensors (Basel); 2018 May; 18(5):. PubMed ID: 29789475
    [TBL] [Abstract][Full Text] [Related]  

  • 24. An Aggregate Signature Scheme Based on a Trapdoor Hash Function for the Internet of Things.
    Shu H; Chen F; Xie D; Sun L; Qi P; Huang Y
    Sensors (Basel); 2019 Sep; 19(19):. PubMed ID: 31569570
    [TBL] [Abstract][Full Text] [Related]  

  • 25. HSC-MET: Heterogeneous signcryption scheme supporting multi-ciphertext equality test for Internet of Drones.
    Yang X; Ren N; Chen A; Wang Z; Wang C
    PLoS One; 2022; 17(9):e0274695. PubMed ID: 36173984
    [TBL] [Abstract][Full Text] [Related]  

  • 26. Post quantum blockchain architecture for internet of things over NTRU lattice.
    Yuan B; Wu F; Zheng Z
    PLoS One; 2023; 18(2):e0279429. PubMed ID: 36724147
    [TBL] [Abstract][Full Text] [Related]  

  • 27. Post-Quantum Secure Identity-Based Proxy Blind Signature Scheme on a Lattice.
    Li F; Yang M; Song Z; Wang P; Li G
    Entropy (Basel); 2023 Aug; 25(8):. PubMed ID: 37628187
    [TBL] [Abstract][Full Text] [Related]  

  • 28. A Provably-Secure Transmission Scheme for Wireless Body Area Networks.
    Omala AA; Robert N; Li F
    J Med Syst; 2016 Nov; 40(11):247. PubMed ID: 27704456
    [TBL] [Abstract][Full Text] [Related]  

  • 29. Multi-sensor network tracking research utilizing searchable encryption algorithm in the cloud computing environment.
    Sun X; Li S
    PeerJ Comput Sci; 2023; 9():e1433. PubMed ID: 37409083
    [TBL] [Abstract][Full Text] [Related]  

  • 30. Efficient Equality Test on Identity-Based Ciphertexts Supporting Flexible Authorization.
    Li N
    Entropy (Basel); 2023 Feb; 25(2):. PubMed ID: 36832728
    [TBL] [Abstract][Full Text] [Related]  

  • 31. Certificateless broadcast signcryption scheme supporting equality test in smart grid.
    Niu S; Dong R; Fang L
    PLoS One; 2023; 18(9):e0290666. PubMed ID: 37676890
    [TBL] [Abstract][Full Text] [Related]  

  • 32. Cryptanalysis and improvement of an elliptic curve based signcryption scheme for firewalls.
    Zia M; Ali R
    PLoS One; 2018; 13(12):e0208857. PubMed ID: 30543691
    [TBL] [Abstract][Full Text] [Related]  

  • 33. Novel efficient lattice-based IBE schemes with CPK for fog computing.
    Shi Y; Qiu S; Liu J; Ma T
    Math Biosci Eng; 2020 Nov; 17(6):8105-8122. PubMed ID: 33378935
    [TBL] [Abstract][Full Text] [Related]  

  • 34. Design and Embedded Implementation of Secure Image Encryption Scheme Using DWT and 2D-LASM.
    Wen H; Chen Z; Zheng J; Huang Y; Li S; Ma L; Lin Y; Liu Z; Li R; Liu L; Lin W; Yang J; Zhang C; Yang H
    Entropy (Basel); 2022 Sep; 24(10):. PubMed ID: 37420352
    [TBL] [Abstract][Full Text] [Related]  

  • 35. Secret sharing scheme based on spread spectrum ghost imaging.
    Liu J; Wang L; Zhao S
    Appl Opt; 2022 Aug; 61(24):7102-7107. PubMed ID: 36256327
    [TBL] [Abstract][Full Text] [Related]  

  • 36. Blockchain-Based Access Control Scheme for Secure Shared Personal Health Records over Decentralised Storage.
    Hussien HM; Yasin SM; Udzir NI; Ninggal MIH
    Sensors (Basel); 2021 Apr; 21(7):. PubMed ID: 33918266
    [TBL] [Abstract][Full Text] [Related]  

  • 37. Completely anonymous multi-recipient signcryption scheme with public verification.
    Pang L; Li H; Gao L; Wang Y
    PLoS One; 2013; 8(5):e63562. PubMed ID: 23675490
    [TBL] [Abstract][Full Text] [Related]  

  • 38. A Comprehensive Survey on Signcryption Security Mechanisms in Wireless Body Area Networks.
    Hussain S; Ullah SS; Uddin M; Iqbal J; Chen CL
    Sensors (Basel); 2022 Jan; 22(3):. PubMed ID: 35161818
    [TBL] [Abstract][Full Text] [Related]  

  • 39. A secure multi-party computation protocol without CRS supporting multi-bit encryption.
    Zhu ZW; Huang RW
    PLoS One; 2022; 17(3):e0265572. PubMed ID: 35303034
    [TBL] [Abstract][Full Text] [Related]  

  • 40. A Novel Chaotic Image Encryption Scheme Armed with Global Dynamic Selection.
    Chen X; Wang Q; Fan L; Yu S
    Entropy (Basel); 2023 Mar; 25(3):. PubMed ID: 36981364
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 6.