These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

114 related articles for article (PubMed ID: 38660204)

  • 21. DiLizium: A Two-Party Lattice-Based Signature Scheme.
    Vakarjuk J; Snetkov N; Willemson J
    Entropy (Basel); 2021 Jul; 23(8):. PubMed ID: 34441129
    [TBL] [Abstract][Full Text] [Related]  

  • 22. Privacy-Preserving Federated Learning for Internet of Medical Things Under Edge Computing.
    Wang R; Lai J; Zhang Z; Li X; Vijayakumar P; Karuppiah M
    IEEE J Biomed Health Inform; 2023 Feb; 27(2):854-865. PubMed ID: 35259124
    [TBL] [Abstract][Full Text] [Related]  

  • 23. Reusable Mesh Signature Scheme for Protecting Identity Privacy of IoT Devices.
    Gu K; Zhang W; Lim SJ; Sharma PK; Al-Makhadmeh Z; Tolba A
    Sensors (Basel); 2020 Jan; 20(3):. PubMed ID: 32019128
    [TBL] [Abstract][Full Text] [Related]  

  • 24. A New Quantum Blind Signature Scheme with BB84-State.
    Chen FL; Wang ZH; Hu YM
    Entropy (Basel); 2019 Mar; 21(4):. PubMed ID: 33267050
    [TBL] [Abstract][Full Text] [Related]  

  • 25. An improved efficient anonymous authentication with conditional privacy-preserving scheme for VANETs.
    Cahyadi EF; Hwang MS
    PLoS One; 2021; 16(9):e0257044. PubMed ID: 34506565
    [TBL] [Abstract][Full Text] [Related]  

  • 26. Untraceable partially blind signature based on DLOG problem.
    Huang Z; Chen KF; Kou WD
    J Zhejiang Univ Sci; 2004 Jan; 5(1):40-4. PubMed ID: 14663850
    [TBL] [Abstract][Full Text] [Related]  

  • 27. An Identity-Based Anti-Quantum Privacy-Preserving Blind Authentication in Wireless Sensor Networks.
    Zhu H; Tan YA; Zhu L; Wang X; Zhang Q; Li Y
    Sensors (Basel); 2018 May; 18(5):. PubMed ID: 29789475
    [TBL] [Abstract][Full Text] [Related]  

  • 28. Efficient certificate-based signcryption secure against public key replacement attacks and insider attacks.
    Lu Y; Li J
    ScientificWorldJournal; 2014; 2014():295419. PubMed ID: 24959606
    [TBL] [Abstract][Full Text] [Related]  

  • 29. An electronic voting scheme based on homomorphic encryption and decentralization.
    Yuan K; Sang P; Zhang S; Chen X; Yang W; Jia C
    PeerJ Comput Sci; 2023; 9():e1649. PubMed ID: 38077585
    [TBL] [Abstract][Full Text] [Related]  

  • 30. An enhanced pairing-free certificateless directed signature scheme.
    Yang K
    PLoS One; 2022; 17(2):e0263943. PubMed ID: 35176087
    [TBL] [Abstract][Full Text] [Related]  

  • 31. Secure Ring Signature Scheme for Privacy-Preserving Blockchain.
    Wang L; Peng C; Tan W
    Entropy (Basel); 2023 Sep; 25(9):. PubMed ID: 37761633
    [TBL] [Abstract][Full Text] [Related]  

  • 32. Message Integration Authentication in the Internet-of-Things via Lattice-Based Batch Signatures.
    Lu X; Yin W; Wen Q; Liang K; Chen L; Chen J
    Sensors (Basel); 2018 Nov; 18(11):. PubMed ID: 30463382
    [TBL] [Abstract][Full Text] [Related]  

  • 33. Attribute-Based Verifiable Conditional Proxy Re-Encryption Scheme.
    Tang Y; Jin M; Meng H; Yang L; Zheng C
    Entropy (Basel); 2023 May; 25(5):. PubMed ID: 37238577
    [TBL] [Abstract][Full Text] [Related]  

  • 34. Homomorphic Encryption-Based Federated Privacy Preservation for Deep Active Learning.
    Kurniawan H; Mambo M
    Entropy (Basel); 2022 Oct; 24(11):. PubMed ID: 36359635
    [TBL] [Abstract][Full Text] [Related]  

  • 35. Web-Based Privacy-Preserving Multicenter Medical Data Analysis Tools Via Threshold Homomorphic Encryption: Design and Development Study.
    Lu Y; Zhou T; Tian Y; Zhu S; Li J
    J Med Internet Res; 2020 Dec; 22(12):e22555. PubMed ID: 33289676
    [TBL] [Abstract][Full Text] [Related]  

  • 36. A secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care.
    Das AK; Goswami A
    J Med Syst; 2013 Jun; 37(3):9948. PubMed ID: 23660745
    [TBL] [Abstract][Full Text] [Related]  

  • 37. Centralized Threshold Key Generation Protocol Based on Shamir Secret Sharing and HMAC Authentication.
    Abdel Hakeem SA; Kim H
    Sensors (Basel); 2022 Jan; 22(1):. PubMed ID: 35009873
    [TBL] [Abstract][Full Text] [Related]  

  • 38. BLOOM: BLoom filter based oblivious outsourced matchings.
    Ziegeldorf JH; Pennekamp J; Hellmanns D; Schwinger F; Kunze I; Henze M; Hiller J; Matzutt R; Wehrle K
    BMC Med Genomics; 2017 Jul; 10(Suppl 2):44. PubMed ID: 28786361
    [TBL] [Abstract][Full Text] [Related]  

  • 39. Privacy-Oriented Technique for COVID-19 Contact Tracing (PROTECT) Using Homomorphic Encryption: Design and Development Study.
    An Y; Lee S; Jung S; Park H; Song Y; Ko T
    J Med Internet Res; 2021 Jul; 23(7):e26371. PubMed ID: 33999829
    [TBL] [Abstract][Full Text] [Related]  

  • 40. An efficient and secure attribute based signcryption scheme with LSSS access structure.
    Hong H; Sun Z
    Springerplus; 2016; 5():644. PubMed ID: 27330910
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 6.