These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

114 related articles for article (PubMed ID: 38660204)

  • 1. A structure-preserving linearly homomorphic signature scheme with designated combiner.
    Zhou X; Tian Y; Zhong W; Zhou T; Yang X
    PeerJ Comput Sci; 2024; 10():e1978. PubMed ID: 38660204
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Post-Quantum Secure Identity-Based Proxy Blind Signature Scheme on a Lattice.
    Li F; Yang M; Song Z; Wang P; Li G
    Entropy (Basel); 2023 Aug; 25(8):. PubMed ID: 37628187
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Efficient attribute-based strong designated verifier signature scheme based on elliptic curve cryptography.
    Ma R; Du L
    PLoS One; 2024; 19(5):e0300153. PubMed ID: 38722905
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Revocable identity-based proxy re-signature against signing key exposure.
    Yang X; Chen C; Ma T; Wang J; Wang C
    PLoS One; 2018; 13(3):e0194783. PubMed ID: 29579125
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Preserving Health Care Data Security and Privacy Using Carmichael's Theorem-Based Homomorphic Encryption and Modified Enhanced Homomorphic Encryption Schemes in Edge Computing Systems.
    Kumari KA; Sharma A; Chakraborty C; Ananyaa M
    Big Data; 2022 Feb; 10(1):1-17. PubMed ID: 34375143
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Research on Quantum-Attack-Resistant Strong Forward-Secure Signature Schemes.
    Li F; Wang J; Shang M; Zhang D; Li T
    Entropy (Basel); 2023 Aug; 25(8):. PubMed ID: 37628189
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Novel Threshold Changeable Secret Sharing Schemes Based on Polynomial Interpolation.
    Yuan L; Li M; Guo C; Choo KR; Ren Y
    PLoS One; 2016; 11(10):e0165512. PubMed ID: 27792784
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Blockchain-enhanced certificateless signature scheme in the standard model.
    Yang X; Wen H; Liu L; Ren N; Wang C
    Math Biosci Eng; 2023 May; 20(7):12718-12730. PubMed ID: 37501463
    [TBL] [Abstract][Full Text] [Related]  

  • 9. A Hash-Based Quantum-Resistant Chameleon Signature Scheme.
    Thanalakshmi P; Anitha R; Anbazhagan N; Cho W; Joshi GP; Yang E
    Sensors (Basel); 2021 Dec; 21(24):. PubMed ID: 34960507
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Security analysis of the unrestricted identity-based aggregate signature scheme.
    Lee K; Lee DH
    PLoS One; 2015; 10(5):e0128081. PubMed ID: 25993247
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Cryptanalysis of the SHMW signature scheme.
    Lau TSC; Kamel Ariffin MR; Yip SC; Chin JJ; Ting CY
    Heliyon; 2024 Jan; 10(2):e24185. PubMed ID: 38298683
    [TBL] [Abstract][Full Text] [Related]  

  • 12. A short certificateless aggregate signature against coalition attacks.
    Yang X; Wang J; Ma T; Li Y; Wang C
    PLoS One; 2018; 13(12):e0205453. PubMed ID: 30540746
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Efficient unrestricted identity-based aggregate signature scheme.
    Yuan Y; Zhan Q; Huang H
    PLoS One; 2014; 9(10):e110100. PubMed ID: 25329777
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Identity-Based Proxy Signature with Message Recovery over NTRU Lattice.
    Wu F; Zhou B; Zhang X
    Entropy (Basel); 2023 Mar; 25(3):. PubMed ID: 36981342
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Revocable Signature Scheme with Implicit and Explicit Certificates.
    Pejaś J; Hyla T; Zabierowski W
    Entropy (Basel); 2023 Sep; 25(9):. PubMed ID: 37761614
    [TBL] [Abstract][Full Text] [Related]  

  • 16. A Lattice-Based Homomorphic Proxy Re-Encryption Scheme with Strong Anti-Collusion for Cloud Computing.
    Li J; Qiao Z; Zhang K; Cui C
    Sensors (Basel); 2021 Jan; 21(1):. PubMed ID: 33406662
    [TBL] [Abstract][Full Text] [Related]  

  • 17. An Aggregate Signature Scheme Based on a Trapdoor Hash Function for the Internet of Things.
    Shu H; Chen F; Xie D; Sun L; Qi P; Huang Y
    Sensors (Basel); 2019 Sep; 19(19):. PubMed ID: 31569570
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Distributed Random Beacon for Blockchain Based on Share Recovery Threshold Signature.
    Zhu Y; Li B; Yang Y; Ding Z; Zheng H; He G; Hou S
    Sensors (Basel); 2022 Aug; 22(16):. PubMed ID: 36015764
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Efficient Linkable Ring Signature Scheme over NTRU Lattice with Unconditional Anonymity.
    Ye Q; Wang M; Meng H; Xia F; Yan X
    Comput Intell Neurosci; 2022; 2022():8431874. PubMed ID: 35602625
    [TBL] [Abstract][Full Text] [Related]  

  • 20. CSI-Otter: isogeny-based (partially) blind signatures from the class group action with a twist.
    Katsumata S; Lai YF; LeGrow JT; Qin L
    Des Codes Cryptogr; 2024; 92(11):3587-3643. PubMed ID: 39355284
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 6.