These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

121 related articles for article (PubMed ID: 38693269)

  • 1. Software implementation of systematic polar encoding based PKC-SPE cryptosystem for quantum cybersecurity.
    Redhu R; Narwal E; Gupta S; Hooda R; Ahlawat S; Khurana R
    Sci Rep; 2024 May; 14(1):9994. PubMed ID: 38693269
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms.
    Farooq S; Altaf A; Iqbal F; Thompson EB; Vargas DLR; Díez IT; Ashraf I
    Sensors (Basel); 2023 Jun; 23(12):. PubMed ID: 37420546
    [TBL] [Abstract][Full Text] [Related]  

  • 3. An Enhanced Architecture to Resolve Public-Key Cryptographic Issues in the Internet of Things (IoT), Employing Quantum Computing Supremacy.
    Shamshad S; Riaz F; Riaz R; Rizvi SS; Abdulla S
    Sensors (Basel); 2022 Oct; 22(21):. PubMed ID: 36365848
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Implementing a Chaotic Cryptosystem by Performing Parallel Computing on Embedded Systems with Multiprocessors.
    Flores-Vergara A; Inzunza-González E; García-Guerrero EE; López-Bonilla OR; Rodríguez-Orozco E; Hernández-Ontiveros JM; Cárdenas-Valdez JR; Tlelo-Cuautle E
    Entropy (Basel); 2019 Mar; 21(3):. PubMed ID: 33266983
    [TBL] [Abstract][Full Text] [Related]  

  • 5. A secured cryptographic system based on DNA and a hybrid key generation approach.
    Indrasena Reddy M; Siva Kumar AP; Subba Reddy K
    Biosystems; 2020 Nov; 197():104207. PubMed ID: 32653339
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Secure Cloud-Based EHR System Using Attribute-Based Cryptosystem and Blockchain.
    Wang H; Song Y
    J Med Syst; 2018 Jul; 42(8):152. PubMed ID: 29974270
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Collision in double-image encryption scheme based on spatial encoding and phase-truncation Fourier transforms.
    Xiong Y; Gu J; Kumar R
    Appl Opt; 2023 Nov; 62(31):8416-8425. PubMed ID: 38037947
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Quantum Cryptanalysis on a Multivariate Cryptosystem Based on Clipped Hopfield Neural Network.
    Dai S
    IEEE Trans Neural Netw Learn Syst; 2022 Sep; 33(9):5080-5084. PubMed ID: 33646959
    [TBL] [Abstract][Full Text] [Related]  

  • 9. NTRU-Like Random Congruential Public-Key Cryptosystem for Wireless Sensor Networks.
    Ibrahim A; Chefranov A; Hamad N; Daraghmi YA; Al-Khasawneh A; Rodrigues JJPC
    Sensors (Basel); 2020 Aug; 20(16):. PubMed ID: 32824585
    [TBL] [Abstract][Full Text] [Related]  

  • 10. A System-on-a-Chip Implementation of a Post-Quantum Cryptography Scheme for Smart Meter Data Communications.
    Costa VLRD; López J; Ribeiro MV
    Sensors (Basel); 2022 Sep; 22(19):. PubMed ID: 36236316
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Implementing RSA for Wireless Sensor Nodes.
    Gulen U; Alkhodary A; Baktir S
    Sensors (Basel); 2019 Jun; 19(13):. PubMed ID: 31252685
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Optical scanning cryptography for secure wireless transmission.
    Poon TC; Kim T; Doh K
    Appl Opt; 2003 Nov; 42(32):6496-503. PubMed ID: 14650492
    [TBL] [Abstract][Full Text] [Related]  

  • 13. An effective and secure key-management scheme for hierarchical access control in E-medicine system.
    Odelu V; Das AK; Goswami A
    J Med Syst; 2013 Apr; 37(2):9920. PubMed ID: 23392626
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Quantum Misuse Attack on Frodo.
    Wang Y; Jiang H; Ma Z
    Entropy (Basel); 2022 Oct; 24(10):. PubMed ID: 37420438
    [TBL] [Abstract][Full Text] [Related]  

  • 15. A chaotic cryptosystem for images based on Henon and Arnold cat map.
    Soleymani A; Nordin MJ; Sundararajan E
    ScientificWorldJournal; 2014; 2014():536930. PubMed ID: 25258724
    [TBL] [Abstract][Full Text] [Related]  

  • 16. An Approach to Cryptography Based on Continuous-Variable Quantum Neural Network.
    Shi J; Chen S; Lu Y; Feng Y; Shi R; Yang Y; Li J
    Sci Rep; 2020 Feb; 10(1):2107. PubMed ID: 32034194
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Post-quantum healthcare: A roadmap for cybersecurity resilience in medical data.
    SaberiKamarposhti M; Ng KW; Chua FF; Abdullah J; Yadollahi M; Moradi M; Ahmadpour S
    Heliyon; 2024 May; 10(10):e31406. PubMed ID: 38826742
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Optical asymmetric JTC cryptosystem based on binary phase modulation and image superposition-subtraction operation.
    Liu Y; Shen X; Zhou B; Liu J; Cai J; Liu X; Cheng Y
    Appl Opt; 2022 Oct; 61(29):8711-8729. PubMed ID: 36256005
    [TBL] [Abstract][Full Text] [Related]  

  • 19. How to Construct Polar Codes for Ring-LWE-Based Public Key Encryption.
    Wang J; Ling C
    Entropy (Basel); 2021 Jul; 23(8):. PubMed ID: 34441077
    [TBL] [Abstract][Full Text] [Related]  

  • 20. A Provably Secure IBE Transformation Model for PKC Using Conformable Chebyshev Chaotic Maps under Human-Centered IoT Environments.
    Meshram C; Imoize AL; Aljaedi A; Alharbi AR; Jamal SS; Barve SK
    Sensors (Basel); 2021 Oct; 21(21):. PubMed ID: 34770535
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 7.