These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

128 related articles for article (PubMed ID: 38942907)

  • 1. Information encoding and encryption in acoustic analogues of qubits.
    Ige AS; Cavalluzzi D; Djordjevic IB; Runge K; Deymier PA
    Sci Rep; 2024 Jun; 14(1):14934. PubMed ID: 38942907
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Demonstration of a two-bit controlled-NOT quantum-like gate using classical acoustic qubit-analogues.
    Runge K; Hasan MA; Levine JA; Deymier PA
    Sci Rep; 2022 Aug; 12(1):14066. PubMed ID: 35982078
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Realizing acoustic qubit analogues with nonlinearly tunable phi-bits in externally driven coupled acoustic waveguides.
    Deymier PA; Runge K; Hasan MA; Lata TD; Levine JA; Cutillas P
    Sci Rep; 2023 Jan; 13(1):635. PubMed ID: 36635298
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Experimental classical entanglement in a 16 acoustic qubit-analogue.
    Hasan MA; Runge K; Deymier PA
    Sci Rep; 2021 Dec; 11(1):24248. PubMed ID: 34931009
    [TBL] [Abstract][Full Text] [Related]  

  • 5. A novel image encryption scheme based on quantum dynamical spinning and rotations.
    Khan M; Waseem HM
    PLoS One; 2018; 13(11):e0206460. PubMed ID: 30452455
    [TBL] [Abstract][Full Text] [Related]  

  • 6. A Novel Cipher-Based Data Encryption with Galois Field Theory.
    Hazzazi MM; Attuluri S; Bassfar Z; Joshi K
    Sensors (Basel); 2023 Mar; 23(6):. PubMed ID: 36991997
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Experimental quantum secure network with digital signatures and encryption.
    Yin HL; Fu Y; Li CL; Weng CX; Li BH; Gu J; Lu YS; Huang S; Chen ZB
    Natl Sci Rev; 2023 Apr; 10(4):nwac228. PubMed ID: 37168101
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Post-Quantum Security: Opportunities and Challenges.
    Li S; Chen Y; Chen L; Liao J; Kuang C; Li K; Liang W; Xiong N
    Sensors (Basel); 2023 Oct; 23(21):. PubMed ID: 37960442
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Quantum computing on encrypted data.
    Fisher KA; Broadbent A; Shalm LK; Yan Z; Lavoie J; Prevedel R; Jennewein T; Resch KJ
    Nat Commun; 2014; 5():3074. PubMed ID: 24445949
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Quantum enigma machine: Experimentally demonstrating quantum data locking.
    Lum DJ; Howell JC; Allman MS; Gerrits T; Verma VB; Nam SW; Lupo C; Lloyd S
    Phys Rev A (Coll Park); 2016; 94():. PubMed ID: 31093584
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms.
    Farooq S; Altaf A; Iqbal F; Thompson EB; Vargas DLR; Díez IT; Ashraf I
    Sensors (Basel); 2023 Jun; 23(12):. PubMed ID: 37420546
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Secure Collaborative Platform for Health Care Research in an Open Environment: Perspective on Accountability in Access Control.
    Kang G; Kim YG
    J Med Internet Res; 2022 Oct; 24(10):e37978. PubMed ID: 36240003
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Experimental Demonstration of Secure Relay in Quantum Secure Direct Communication Network.
    Wang M; Zhang W; Guo J; Song X; Long G
    Entropy (Basel); 2023 Nov; 25(11):. PubMed ID: 37998240
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Measurement-device-independent quantum communication without encryption.
    Niu PH; Zhou ZR; Lin ZS; Sheng YB; Yin LG; Long GL
    Sci Bull (Beijing); 2018 Oct; 63(20):1345-1350. PubMed ID: 36658905
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Logistic regression over encrypted data from fully homomorphic encryption.
    Chen H; Gilad-Bachrach R; Han K; Huang Z; Jalali A; Laine K; Lauter K
    BMC Med Genomics; 2018 Oct; 11(Suppl 4):81. PubMed ID: 30309350
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Satellite Quantum Communications When Man-in-the-Middle Attacks Are Excluded.
    Vergoossen T; Bedington R; Grieve JA; Ling A
    Entropy (Basel); 2019 Apr; 21(4):. PubMed ID: 33267101
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Cryptography as information control.
    West SM
    Soc Stud Sci; 2022 Jun; 52(3):353-375. PubMed ID: 35362349
    [TBL] [Abstract][Full Text] [Related]  

  • 18. A quantum encryption design featuring confusion, diffusion, and mode of operation.
    Hu Z; Kais S
    Sci Rep; 2021 Dec; 11(1):23774. PubMed ID: 34893658
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Quantum Secure Multi-Party Summation with Graph State.
    Lu Y; Ding G
    Entropy (Basel); 2024 Jan; 26(1):. PubMed ID: 38248205
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Cryptographic Algorithms with Data Shorter than the Encryption Key, Based on LZW and Huffman Coding.
    Krokosz T; Rykowski J; Zajęcka M; Brzoza-Woch R; Rutkowski L
    Sensors (Basel); 2023 Aug; 23(17):. PubMed ID: 37687864
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 7.