These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
117 related articles for article (PubMed ID: 38400305)
1. A Security Information Transmission Method Based on DHR for Seafloor Observation Network. Ying F; Zhao S; Wang J Sensors (Basel); 2024 Feb; 24(4):. PubMed ID: 38400305 [TBL] [Abstract][Full Text] [Related]
2. An Optimized Encryption Storage Scheme for Blockchain Data Based on Cold and Hot Blocks and Threshold Secret Sharing. Yang D; Tsai WT Entropy (Basel); 2024 Aug; 26(8):. PubMed ID: 39202160 [TBL] [Abstract][Full Text] [Related]
3. Multiuser communication scheme based on binary phase-shift keying and chaos for telemedicine. Michel-Macarty JA; Murillo-Escobar MA; López-Gutiérrez RM; Cruz-Hernández C; Cardoza-Avendaño L Comput Methods Programs Biomed; 2018 Aug; 162():165-175. PubMed ID: 29903483 [TBL] [Abstract][Full Text] [Related]
4. BRISK: Dynamic Encryption Based Cipher for Long Term Security. Dwivedi AD Sensors (Basel); 2021 Aug; 21(17):. PubMed ID: 34502635 [TBL] [Abstract][Full Text] [Related]
5. Preserving Health Care Data Security and Privacy Using Carmichael's Theorem-Based Homomorphic Encryption and Modified Enhanced Homomorphic Encryption Schemes in Edge Computing Systems. Kumari KA; Sharma A; Chakraborty C; Ananyaa M Big Data; 2022 Feb; 10(1):1-17. PubMed ID: 34375143 [TBL] [Abstract][Full Text] [Related]
6. Privacy-Enhancing Li Y; Zhou F; Ge Y; Xu Z Sensors (Basel); 2021 Jun; 21(12):. PubMed ID: 34207856 [TBL] [Abstract][Full Text] [Related]
9. A Novel Message-Preserving Scheme with Format-Preserving Encryption for Connected Cars in Multi-Access Edge Computing. Oh I; Kim T; Yim K; Lee SY Sensors (Basel); 2019 Sep; 19(18):. PubMed ID: 31500320 [TBL] [Abstract][Full Text] [Related]
10. A Blockchain Framework for Patient-Centered Health Records and Exchange (HealthChain): Evaluation and Proof-of-Concept Study. Hylock RH; Zeng X J Med Internet Res; 2019 Aug; 21(8):e13592. PubMed ID: 31471959 [TBL] [Abstract][Full Text] [Related]
11. A Malicious Behavior Awareness and Defense Countermeasure Based on LoRaWAN Protocol. Gao SY; Li XH; Ma MD Sensors (Basel); 2019 Nov; 19(23):. PubMed ID: 31766778 [TBL] [Abstract][Full Text] [Related]
12. Dual-Level Security based Cyclic18 Steganographic Method and its Application for Secure Transmission of Keyframes during Wireless Capsule Endoscopy. Muhammad K; Sajjad M; Baik SW J Med Syst; 2016 May; 40(5):114. PubMed ID: 26995355 [TBL] [Abstract][Full Text] [Related]
13. Double Image Encryption System Using a Nonlinear Joint Transform Correlator in the Fourier Domain. Perez RA; Pérez-Cabré E; Vilardy JM; Millán MS; Torres CO Sensors (Basel); 2023 Feb; 23(3):. PubMed ID: 36772681 [TBL] [Abstract][Full Text] [Related]
14. Privacy Preservation in Patient Information Exchange Systems Based on Blockchain: System Design Study. Lee S; Kim J; Kwon Y; Kim T; Cho S J Med Internet Res; 2022 Mar; 24(3):e29108. PubMed ID: 35315778 [TBL] [Abstract][Full Text] [Related]
15. An ACP-Based Parallel Approach for Color Image Encryption Using Redundant Blocks. Zheng W; Yan L; Gou C; Wang FY IEEE Trans Cybern; 2022 Dec; 52(12):13181-13196. PubMed ID: 34818199 [TBL] [Abstract][Full Text] [Related]
16. Optimization of a Deep Learning Algorithm for Security Protection of Big Data from Video Images. Geng Q; Yan H; Lu X Comput Intell Neurosci; 2022; 2022():3394475. PubMed ID: 35300398 [TBL] [Abstract][Full Text] [Related]
17. Design and Embedded Implementation of Secure Image Encryption Scheme Using DWT and 2D-LASM. Wen H; Chen Z; Zheng J; Huang Y; Li S; Ma L; Lin Y; Liu Z; Li R; Liu L; Lin W; Yang J; Zhang C; Yang H Entropy (Basel); 2022 Sep; 24(10):. PubMed ID: 37420352 [TBL] [Abstract][Full Text] [Related]
18. An edge cloud and Fibonacci-Diffie-Hellman encryption scheme for secure printer data transmission. Bao Y; Zhao Q; Sun J; Xu W; Lu H Math Biosci Eng; 2024 Jan; 21(1):96-115. PubMed ID: 38303415 [TBL] [Abstract][Full Text] [Related]
19. A secure remote user authentication scheme for 6LoWPAN-based Internet of Things. Abbas G; Tanveer M; Abbas ZH; Waqas M; Baker T; Al-Jumeily Obe D PLoS One; 2021; 16(11):e0258279. PubMed ID: 34748568 [TBL] [Abstract][Full Text] [Related]
20. A Novel Image Encryption Algorithm Based on Improved Arnold Transform and Chaotic Pulse-Coupled Neural Network. Ye J; Deng X; Zhang A; Yu H Entropy (Basel); 2022 Aug; 24(8):. PubMed ID: 36010767 [TBL] [Abstract][Full Text] [Related] [Next] [New Search]