These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

114 related articles for article (PubMed ID: 38920512)

  • 1. Refinements and Extensions of Ziv's Model of Perfect Secrecy for Individual Sequences.
    Merhav N
    Entropy (Basel); 2024 Jun; 26(6):. PubMed ID: 38920512
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Encoding Individual Source Sequences for the Wiretap Channel.
    Merhav N
    Entropy (Basel); 2021 Dec; 23(12):. PubMed ID: 34946000
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Physical-layer security analysis of a quantum-noise randomized cipher based on the wire-tap channel model.
    Jiao H; Pu T; Zheng J; Xiang P; Fang T
    Opt Express; 2017 May; 25(10):10947-10960. PubMed ID: 28788782
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Secrecy Capacity Region of the AWGN MAC with External Eavesdropper and Feedback.
    Yuan H; Xie G; Dai B
    Entropy (Basel); 2023 Sep; 25(9):. PubMed ID: 37761639
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Lossy Compression of Individual Sequences Revisited: Fundamental Limits of Finite-State Encoders.
    Merhav N
    Entropy (Basel); 2024 Jan; 26(2):. PubMed ID: 38392371
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Evaluation of Secrecy Capacity for Next-Generation Leadless Cardiac Pacemakers.
    Awan MF; Bose P; Khaleghi A; Kansanen K; Balasingham I
    IEEE Trans Biomed Eng; 2020 Aug; 67(8):2297-2308. PubMed ID: 31831404
    [TBL] [Abstract][Full Text] [Related]  

  • 7. A New Image Encryption Algorithm Based on Chaos and Secure Hash SHA-256.
    Zhu S; Zhu C; Wang W
    Entropy (Basel); 2018 Sep; 20(9):. PubMed ID: 33265805
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Secrecy Capacity of a Class of Erasure Wiretap Channels in WBAN.
    Wang B; Deng J; Sun Y; Guo W; Feng G
    Sensors (Basel); 2018 Nov; 18(12):. PubMed ID: 30486250
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Variance estimators for the Lempel-Ziv entropy rate estimator.
    Amigó JM; Kennel MB
    Chaos; 2006 Dec; 16(4):043102. PubMed ID: 17199380
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Joint Lossless Image Compression and Encryption Scheme Based on CALIC and Hyperchaotic System.
    Zhang M; Tong X; Wang Z; Chen P
    Entropy (Basel); 2021 Aug; 23(8):. PubMed ID: 34441236
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Experimental Phantom-Based Security Analysis for Next-Generation Leadless Cardiac Pacemakers.
    Awan MF; Perez-Simbor S; Garcia-Pardo C; Kansanen K; Cardona N
    Sensors (Basel); 2018 Dec; 18(12):. PubMed ID: 30544594
    [TBL] [Abstract][Full Text] [Related]  

  • 12. A Novel Chaotic Image Encryption Scheme Armed with Global Dynamic Selection.
    Chen X; Wang Q; Fan L; Yu S
    Entropy (Basel); 2023 Mar; 25(3):. PubMed ID: 36981364
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Secure Image Encryption Algorithm Based on Hyperchaos and Dynamic DNA Coding.
    Zhu S; Zhu C
    Entropy (Basel); 2020 Jul; 22(7):. PubMed ID: 33286544
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Secure Multiuser Communications in Wireless Sensor Networks with TAS and Cooperative Jamming.
    Yang M; Zhang B; Huang Y; Yang N; Guo D; Gao B
    Sensors (Basel); 2016 Nov; 16(11):. PubMed ID: 27845753
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Plaintext-Related Dynamic Key Chaotic Image Encryption Algorithm.
    Wu Z; Pan P; Sun C; Zhao B
    Entropy (Basel); 2021 Sep; 23(9):. PubMed ID: 34573784
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Secrecy Performance Analysis of Cooperative Multihop Transmission for WSNs under Eavesdropping Attacks.
    Triwidyastuti Y; Perdana RHY; Shim K; An B
    Sensors (Basel); 2023 Sep; 23(17):. PubMed ID: 37688109
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Multiuser communication scheme based on binary phase-shift keying and chaos for telemedicine.
    Michel-Macarty JA; Murillo-Escobar MA; López-Gutiérrez RM; Cruz-Hernández C; Cardoza-Avendaño L
    Comput Methods Programs Biomed; 2018 Aug; 162():165-175. PubMed ID: 29903483
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Physical Layer Security in Two-Way SWIPT Relay Networks with Imperfect CSI and a Friendly Jammer.
    Hayajneh M; Gulliver TA
    Entropy (Basel); 2023 Jan; 25(1):. PubMed ID: 36673263
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Secure and private NOMA VLC using OFDM with two-level chaotic encryption.
    Yang Y; Chen C; Zhang W; Deng X; Du P; Yang H; Zhong WD; Chen L
    Opt Express; 2018 Dec; 26(26):34031-34042. PubMed ID: 30650833
    [TBL] [Abstract][Full Text] [Related]  

  • 20. On the non-randomness of maximum Lempel Ziv complexity sequences of finite size.
    Estevez-Rams E; Lora Serrano R; Aragón Fernández B; Brito Reyes I
    Chaos; 2013 Jun; 23(2):023118. PubMed ID: 23822483
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 6.