These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
26. Secure data authentication and access control protocol for industrial healthcare system. Gupta DS; Mazumdar N; Nag A; Singh JP J Ambient Intell Humaniz Comput; 2023; 14(5):4853-4864. PubMed ID: 36684481 [TBL] [Abstract][Full Text] [Related]
27. Continuous variable quantum steganography protocol based on quantum identity. Qu ZG; Jiang LM; Sun L; Wang MM; Wang XJ Math Biosci Eng; 2019 May; 16(5):4182-4195. PubMed ID: 31499657 [TBL] [Abstract][Full Text] [Related]
28. DDoS attack detection in smart grid network using reconstructive machine learning models. Naqvi SSA; Li Y; Uzair M PeerJ Comput Sci; 2024; 10():e1784. PubMed ID: 38259891 [TBL] [Abstract][Full Text] [Related]
29. LR-AKAP: A Lightweight and Robust Security Protocol for Smart Home Environments. Haseeb-Ur-Rehman RMA; Liaqat M; Aman AHM; Almazroi AA; Hasan MK; Ali Z; Ali RL Sensors (Basel); 2022 Sep; 22(18):. PubMed ID: 36146250 [TBL] [Abstract][Full Text] [Related]
30. A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Yeh HL; Chen TH; Liu PC; Kim TH; Wei HW Sensors (Basel); 2011; 11(5):4767-79. PubMed ID: 22163874 [TBL] [Abstract][Full Text] [Related]
31. An Efficient Quantum Secret Sharing Scheme Based on Restricted Threshold Access Structure. Li L; Li Z Entropy (Basel); 2023 Jan; 25(2):. PubMed ID: 36832630 [TBL] [Abstract][Full Text] [Related]
32. Device-independent quantum secure direct communication against collective attacks. Zhou L; Sheng YB; Long GL Sci Bull (Beijing); 2020 Jan; 65(1):12-20. PubMed ID: 36659063 [TBL] [Abstract][Full Text] [Related]
33. Encryption chain based on measurement result and its applications on semi-quantum key distribution protocol. Yang CW Sci Rep; 2022 Nov; 12(1):18381. PubMed ID: 36319692 [TBL] [Abstract][Full Text] [Related]
34. IoMT-Based Smart Healthcare Detection System Driven by Quantum Blockchain and Quantum Neural Network. Qu Z; Shi W; Liu B; Gupta D; Tiwari P IEEE J Biomed Health Inform; 2024 Jun; 28(6):3317-3328. PubMed ID: 37399158 [TBL] [Abstract][Full Text] [Related]
35. Hash-Chain Fog/Edge: A Mode-Based Hash-Chain for Secured Mutual Authentication Protocol Using Zero-Knowledge Proofs in Fog/Edge. Pardeshi MS; Sheu RK; Yuan SM Sensors (Basel); 2022 Jan; 22(2):. PubMed ID: 35062563 [TBL] [Abstract][Full Text] [Related]
36. Authenticated Semi-Quantum Key Distribution Protocol Based on W States. Wang HW; Tsai CW; Lin J; Yang CW Sensors (Basel); 2022 Jul; 22(13):. PubMed ID: 35808492 [TBL] [Abstract][Full Text] [Related]
37. A Lightweight Three-Factor Authentication and Key Agreement Scheme in Wireless Sensor Networks for Smart Homes. Shin S; Kwon T Sensors (Basel); 2019 Apr; 19(9):. PubMed ID: 31035690 [TBL] [Abstract][Full Text] [Related]
38. Cryptanalysis and Improvement of a Privacy-Preserving Three-Factor Authentication Protocol for Wireless Sensor Networks. Renuka K; Kumar S; Kumari S; Chen CM Sensors (Basel); 2019 Oct; 19(21):. PubMed ID: 31653025 [TBL] [Abstract][Full Text] [Related]
39. A Secure Pseudonym-Based Conditional Privacy-Preservation Authentication Scheme in Vehicular Ad Hoc Networks. Al-Shareeda MA; Anbar M; Manickam S; Hasbullah IH Sensors (Basel); 2022 Feb; 22(5):. PubMed ID: 35270843 [TBL] [Abstract][Full Text] [Related]
40. Practical Three-Factor Authentication Protocol Based on Elliptic Curve Cryptography for Industrial Internet of Things. Zhao X; Li D; Li H Sensors (Basel); 2022 Oct; 22(19):. PubMed ID: 36236609 [TBL] [Abstract][Full Text] [Related] [Previous] [Next] [New Search]