These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

117 related articles for article (PubMed ID: 38722905)

  • 1. Efficient attribute-based strong designated verifier signature scheme based on elliptic curve cryptography.
    Ma R; Du L
    PLoS One; 2024; 19(5):e0300153. PubMed ID: 38722905
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Revocable identity-based proxy re-signature against signing key exposure.
    Yang X; Chen C; Ma T; Wang J; Wang C
    PLoS One; 2018; 13(3):e0194783. PubMed ID: 29579125
    [TBL] [Abstract][Full Text] [Related]  

  • 3. An Aggregate Signature Scheme Based on a Trapdoor Hash Function for the Internet of Things.
    Shu H; Chen F; Xie D; Sun L; Qi P; Huang Y
    Sensors (Basel); 2019 Sep; 19(19):. PubMed ID: 31569570
    [TBL] [Abstract][Full Text] [Related]  

  • 4. An enhanced pairing-free certificateless directed signature scheme.
    Yang K
    PLoS One; 2022; 17(2):e0263943. PubMed ID: 35176087
    [TBL] [Abstract][Full Text] [Related]  

  • 5. An effective and secure key-management scheme for hierarchical access control in E-medicine system.
    Odelu V; Das AK; Goswami A
    J Med Syst; 2013 Apr; 37(2):9920. PubMed ID: 23392626
    [TBL] [Abstract][Full Text] [Related]  

  • 6. A secure and efficient certificateless content extraction signature with privacy protection.
    Zhao C; Liu J; Zheng F; Wang D; Meng B
    PLoS One; 2021; 16(11):e0258907. PubMed ID: 34723998
    [TBL] [Abstract][Full Text] [Related]  

  • 7. A Secure Pseudonym-Based Conditional Privacy-Preservation Authentication Scheme in Vehicular Ad Hoc Networks.
    Al-Shareeda MA; Anbar M; Manickam S; Hasbullah IH
    Sensors (Basel); 2022 Feb; 22(5):. PubMed ID: 35270843
    [TBL] [Abstract][Full Text] [Related]  

  • 8. A Lightweight CP-ABE Scheme with Direct Attribute Revocation for Vehicular Ad Hoc Network.
    Liu Y; Xu S; Yue Z
    Entropy (Basel); 2023 Jun; 25(7):. PubMed ID: 37509926
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation.
    Nam J; Choo KK; Han S; Kim M; Paik J; Won D
    PLoS One; 2015; 10(4):e0116709. PubMed ID: 25849359
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Efficient Lattice-Based Ring Signature Scheme without Trapdoors for Machine Learning.
    Ye Q; Lang Y; Zhao Z; Chen Q; Tang Y
    Comput Intell Neurosci; 2022; 2022():6547464. PubMed ID: 36172322
    [TBL] [Abstract][Full Text] [Related]  

  • 11. An environmental monitoring data sharing scheme based on attribute encryption in cloud-fog computing.
    Yang X; Xi W; Chen A; Wang C
    PLoS One; 2021; 16(9):e0258062. PubMed ID: 34591938
    [TBL] [Abstract][Full Text] [Related]  

  • 12. An Efficient and Secure Revocation-Enabled Attribute-Based Access Control for eHealth in Smart Society.
    Khan S; Iqbal W; Waheed A; Mehmood G; Khan S; Zareei M; Biswal RR
    Sensors (Basel); 2022 Jan; 22(1):. PubMed ID: 35009878
    [TBL] [Abstract][Full Text] [Related]  

  • 13. An efficient and secure attribute based signcryption scheme with LSSS access structure.
    Hong H; Sun Z
    Springerplus; 2016; 5():644. PubMed ID: 27330910
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation.
    Xu Q; Tan C; Fan Z; Zhu W; Xiao Y; Cheng F
    Sensors (Basel); 2018 May; 18(5):. PubMed ID: 29772840
    [TBL] [Abstract][Full Text] [Related]  

  • 15. A keyword searchable attribute-based encryption scheme with attribute update for cloud storage.
    Wang S; Ye J; Zhang Y
    PLoS One; 2018; 13(5):e0197318. PubMed ID: 29795577
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol.
    He D; Kumar N; Chilamkurti N; Lee JH
    J Med Syst; 2014 Oct; 38(10):116. PubMed ID: 25096968
    [TBL] [Abstract][Full Text] [Related]  

  • 17. A Computationally Efficient Online/Offline Signature Scheme for Underwater Wireless Sensor Networks.
    Ullah SS; Hussain S; Uddin M; Alroobaea R; Iqbal J; Baqasah AM; Abdelhaq M; Alsaqour R
    Sensors (Basel); 2022 Jul; 22(14):. PubMed ID: 35890830
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Secure Ring Signature Scheme for Privacy-Preserving Blockchain.
    Wang L; Peng C; Tan W
    Entropy (Basel); 2023 Sep; 25(9):. PubMed ID: 37761633
    [TBL] [Abstract][Full Text] [Related]  

  • 19. An Efficient and Practical Smart Card Based Anonymity Preserving User Authentication Scheme for TMIS using Elliptic Curve Cryptography.
    Amin R; Islam SK; Biswas GP; Khan MK; Kumar N
    J Med Syst; 2015 Nov; 39(11):180. PubMed ID: 26433889
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Efficient Linkable Ring Signature Scheme over NTRU Lattice with Unconditional Anonymity.
    Ye Q; Wang M; Meng H; Xia F; Yan X
    Comput Intell Neurosci; 2022; 2022():8431874. PubMed ID: 35602625
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 6.