These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

117 related articles for article (PubMed ID: 38400305)

  • 1. A Security Information Transmission Method Based on DHR for Seafloor Observation Network.
    Ying F; Zhao S; Wang J
    Sensors (Basel); 2024 Feb; 24(4):. PubMed ID: 38400305
    [TBL] [Abstract][Full Text] [Related]  

  • 2. An Optimized Encryption Storage Scheme for Blockchain Data Based on Cold and Hot Blocks and Threshold Secret Sharing.
    Yang D; Tsai WT
    Entropy (Basel); 2024 Aug; 26(8):. PubMed ID: 39202160
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Multiuser communication scheme based on binary phase-shift keying and chaos for telemedicine.
    Michel-Macarty JA; Murillo-Escobar MA; López-Gutiérrez RM; Cruz-Hernández C; Cardoza-Avendaño L
    Comput Methods Programs Biomed; 2018 Aug; 162():165-175. PubMed ID: 29903483
    [TBL] [Abstract][Full Text] [Related]  

  • 4. BRISK: Dynamic Encryption Based Cipher for Long Term Security.
    Dwivedi AD
    Sensors (Basel); 2021 Aug; 21(17):. PubMed ID: 34502635
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Preserving Health Care Data Security and Privacy Using Carmichael's Theorem-Based Homomorphic Encryption and Modified Enhanced Homomorphic Encryption Schemes in Edge Computing Systems.
    Kumari KA; Sharma A; Chakraborty C; Ananyaa M
    Big Data; 2022 Feb; 10(1):1-17. PubMed ID: 34375143
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Privacy-Enhancing
    Li Y; Zhou F; Ge Y; Xu Z
    Sensors (Basel); 2021 Jun; 21(12):. PubMed ID: 34207856
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Lightweight Payload Encryption-Based Authentication Scheme for Advanced Metering Infrastructure Sensor Networks.
    Abosata N; Al-Rubaye S; Inalhan G
    Sensors (Basel); 2022 Jan; 22(2):. PubMed ID: 35062494
    [TBL] [Abstract][Full Text] [Related]  

  • 8. An efficient and compromise-resilient image encryption scheme for resource-constrained environments.
    Khan AN; Mehmood A; Bhutta MNM; Khan IA; Khan AUR
    PLoS One; 2024; 19(4):e0297534. PubMed ID: 38635816
    [TBL] [Abstract][Full Text] [Related]  

  • 9. A Novel Message-Preserving Scheme with Format-Preserving Encryption for Connected Cars in Multi-Access Edge Computing.
    Oh I; Kim T; Yim K; Lee SY
    Sensors (Basel); 2019 Sep; 19(18):. PubMed ID: 31500320
    [TBL] [Abstract][Full Text] [Related]  

  • 10. A Blockchain Framework for Patient-Centered Health Records and Exchange (HealthChain): Evaluation and Proof-of-Concept Study.
    Hylock RH; Zeng X
    J Med Internet Res; 2019 Aug; 21(8):e13592. PubMed ID: 31471959
    [TBL] [Abstract][Full Text] [Related]  

  • 11. A Malicious Behavior Awareness and Defense Countermeasure Based on LoRaWAN Protocol.
    Gao SY; Li XH; Ma MD
    Sensors (Basel); 2019 Nov; 19(23):. PubMed ID: 31766778
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Dual-Level Security based Cyclic18 Steganographic Method and its Application for Secure Transmission of Keyframes during Wireless Capsule Endoscopy.
    Muhammad K; Sajjad M; Baik SW
    J Med Syst; 2016 May; 40(5):114. PubMed ID: 26995355
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Double Image Encryption System Using a Nonlinear Joint Transform Correlator in the Fourier Domain.
    Perez RA; Pérez-Cabré E; Vilardy JM; Millán MS; Torres CO
    Sensors (Basel); 2023 Feb; 23(3):. PubMed ID: 36772681
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Privacy Preservation in Patient Information Exchange Systems Based on Blockchain: System Design Study.
    Lee S; Kim J; Kwon Y; Kim T; Cho S
    J Med Internet Res; 2022 Mar; 24(3):e29108. PubMed ID: 35315778
    [TBL] [Abstract][Full Text] [Related]  

  • 15. An ACP-Based Parallel Approach for Color Image Encryption Using Redundant Blocks.
    Zheng W; Yan L; Gou C; Wang FY
    IEEE Trans Cybern; 2022 Dec; 52(12):13181-13196. PubMed ID: 34818199
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Optimization of a Deep Learning Algorithm for Security Protection of Big Data from Video Images.
    Geng Q; Yan H; Lu X
    Comput Intell Neurosci; 2022; 2022():3394475. PubMed ID: 35300398
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Design and Embedded Implementation of Secure Image Encryption Scheme Using DWT and 2D-LASM.
    Wen H; Chen Z; Zheng J; Huang Y; Li S; Ma L; Lin Y; Liu Z; Li R; Liu L; Lin W; Yang J; Zhang C; Yang H
    Entropy (Basel); 2022 Sep; 24(10):. PubMed ID: 37420352
    [TBL] [Abstract][Full Text] [Related]  

  • 18. An edge cloud and Fibonacci-Diffie-Hellman encryption scheme for secure printer data transmission.
    Bao Y; Zhao Q; Sun J; Xu W; Lu H
    Math Biosci Eng; 2024 Jan; 21(1):96-115. PubMed ID: 38303415
    [TBL] [Abstract][Full Text] [Related]  

  • 19. A secure remote user authentication scheme for 6LoWPAN-based Internet of Things.
    Abbas G; Tanveer M; Abbas ZH; Waqas M; Baker T; Al-Jumeily Obe D
    PLoS One; 2021; 16(11):e0258279. PubMed ID: 34748568
    [TBL] [Abstract][Full Text] [Related]  

  • 20. A Novel Image Encryption Algorithm Based on Improved Arnold Transform and Chaotic Pulse-Coupled Neural Network.
    Ye J; Deng X; Zhang A; Yu H
    Entropy (Basel); 2022 Aug; 24(8):. PubMed ID: 36010767
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 6.