These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

154 related articles for article (PubMed ID: 38192450)

  • 1. Dynamic coefficient symmetric polynomial-based secure key management scheme for Internet of Things (IoT) networks.
    Liu Z; Luo Y
    PeerJ Comput Sci; 2023; 9():e1726. PubMed ID: 38192450
    [TBL] [Abstract][Full Text] [Related]  

  • 2. A secure remote user authentication scheme for 6LoWPAN-based Internet of Things.
    Abbas G; Tanveer M; Abbas ZH; Waqas M; Baker T; Al-Jumeily Obe D
    PLoS One; 2021; 16(11):e0258279. PubMed ID: 34748568
    [TBL] [Abstract][Full Text] [Related]  

  • 3. A Polynomial Subset-Based Efficient Multi-Party Key Management System for Lightweight Device Networks.
    Mahmood Z; Ning H; Ghafoor A
    Sensors (Basel); 2017 Mar; 17(4):. PubMed ID: 28338632
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Application of IoT Authentication Key Management Algorithm to Personnel Information Management.
    Wang Q; Li H
    Comput Intell Neurosci; 2022; 2022():4584072. PubMed ID: 35498183
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Enhancing IoT Security: An Innovative Key Management System for Lightweight Block Ciphers.
    Rana M; Mamun Q; Islam R
    Sensors (Basel); 2023 Sep; 23(18):. PubMed ID: 37765734
    [TBL] [Abstract][Full Text] [Related]  

  • 6. New key management scheme lattice-based for clustered wireless sensor networks.
    Zhang J; Liu Q
    PLoS One; 2023; 18(8):e0290323. PubMed ID: 37647281
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Dickson polynomial-based secure group authentication scheme for Internet of Things.
    Syed SA; Manickam S; Uddin M; Alsufyani H; Shorfuzzaman M; Selvarajan S; Mohammed GB
    Sci Rep; 2024 Feb; 14(1):4947. PubMed ID: 38418484
    [TBL] [Abstract][Full Text] [Related]  

  • 8. An Aggregate Signature Scheme Based on a Trapdoor Hash Function for the Internet of Things.
    Shu H; Chen F; Xie D; Sun L; Qi P; Huang Y
    Sensors (Basel); 2019 Sep; 19(19):. PubMed ID: 31569570
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Distributed Key Management to Secure IoT Wireless Sensor Networks in Smart-Agro.
    Mawlood Hussein S; López Ramos JA; Álvarez Bermejo JA
    Sensors (Basel); 2020 Apr; 20(8):. PubMed ID: 32326650
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Post-Quantum Secure Identity-Based Signature Scheme with Lattice Assumption for Internet of Things Networks.
    Zhang Y; Tang Y; Li C; Zhang H; Ahmad H
    Sensors (Basel); 2024 Jun; 24(13):. PubMed ID: 39000967
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Secure Communications in CIoT Networks with a Wireless Energy Harvesting Untrusted Relay.
    Hu H; Gao Z; Liao X; Leung VCM
    Sensors (Basel); 2017 Sep; 17(9):. PubMed ID: 28869540
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Efficient and secure three-party mutual authentication key agreement protocol for WSNs in IoT environments.
    Chen CT; Lee CC; Lin IC
    PLoS One; 2020; 15(4):e0232277. PubMed ID: 32353049
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Key Management Scheme Based on Route Planning of Mobile Sink in Wireless Sensor Networks.
    Zhang Y; Liang J; Zheng B; Jiang S; Chen W
    Sensors (Basel); 2016 Jan; 16(2):170. PubMed ID: 26840311
    [TBL] [Abstract][Full Text] [Related]  

  • 14. An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System.
    Li CT; Wu TY; Chen CL; Lee CC; Chen CM
    Sensors (Basel); 2017 Jun; 17(7):. PubMed ID: 28644381
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Compressive sensing based secure data aggregation scheme for IoT based WSN applications.
    Salim A; Ismail A; Osamy W; M Khedr A
    PLoS One; 2021; 16(12):e0260634. PubMed ID: 34914706
    [TBL] [Abstract][Full Text] [Related]  

  • 16. SASC: Secure and Authentication-Based Sensor Cloud Architecture for Intelligent Internet of Things.
    Haseeb K; Almogren A; Ud Din I; Islam N; Altameem A
    Sensors (Basel); 2020 Apr; 20(9):. PubMed ID: 32349237
    [TBL] [Abstract][Full Text] [Related]  

  • 17. iAKA-CIoT: An Improved Authentication and Key Agreement Scheme for Cloud Enabled Internet of Things Using Physical Unclonable Function.
    Park K; Park Y
    Sensors (Basel); 2022 Aug; 22(16):. PubMed ID: 36016023
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Exponential Arithmetic Based Self-Healing Group Key Distribution Scheme with Backward Secrecy under the Resource-Constrained Wireless Networks.
    Guo H; Zheng Y; Zhang X; Li Z
    Sensors (Basel); 2016 Apr; 16(5):. PubMed ID: 27136550
    [TBL] [Abstract][Full Text] [Related]  

  • 19. An Asymmetric Encryption-Based Key Distribution Method for Wireless Sensor Networks.
    Cheng Y; Liu Y; Zhang Z; Li Y
    Sensors (Basel); 2023 Jul; 23(14):. PubMed ID: 37514753
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Provably Secure Mutual Authentication and Key Agreement Scheme Using PUF in Internet of Drones Deployments.
    Park Y; Ryu D; Kwon D; Park Y
    Sensors (Basel); 2023 Feb; 23(4):. PubMed ID: 36850634
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 8.