These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

122 related articles for article (PubMed ID: 39202114)

  • 21. An efficient heterogeneous signcryption for smart grid.
    Jin C; Chen G; Yu C; Shan J; Zhao J; Jin Y
    PLoS One; 2018; 13(12):e0208311. PubMed ID: 30562351
    [TBL] [Abstract][Full Text] [Related]  

  • 22. A secure biometrics-based authentication key exchange protocol for multi-server TMIS using ECC.
    Qi M; Chen J; Chen Y
    Comput Methods Programs Biomed; 2018 Oct; 164():101-109. PubMed ID: 30195418
    [TBL] [Abstract][Full Text] [Related]  

  • 23. Quantum Identity Authentication in the Counterfactual Quantum Key Distribution Protocol.
    Liu B; Gao Z; Xiao D; Huang W; Zhang Z; Xu B
    Entropy (Basel); 2019 May; 21(5):. PubMed ID: 33267232
    [TBL] [Abstract][Full Text] [Related]  

  • 24. An enhanced password authentication scheme for session initiation protocol with perfect forward secrecy.
    Qiu S; Xu G; Ahmad H; Guo Y
    PLoS One; 2018; 13(3):e0194072. PubMed ID: 29547619
    [TBL] [Abstract][Full Text] [Related]  

  • 25. A Multi-User, Single-Authentication Protocol for Smart Grid Architectures.
    Alfakeeh AS; Khan S; Al-Bayatti AH
    Sensors (Basel); 2020 Mar; 20(6):. PubMed ID: 32178299
    [TBL] [Abstract][Full Text] [Related]  

  • 26. Secure data authentication and access control protocol for industrial healthcare system.
    Gupta DS; Mazumdar N; Nag A; Singh JP
    J Ambient Intell Humaniz Comput; 2023; 14(5):4853-4864. PubMed ID: 36684481
    [TBL] [Abstract][Full Text] [Related]  

  • 27. Continuous variable quantum steganography protocol based on quantum identity.
    Qu ZG; Jiang LM; Sun L; Wang MM; Wang XJ
    Math Biosci Eng; 2019 May; 16(5):4182-4195. PubMed ID: 31499657
    [TBL] [Abstract][Full Text] [Related]  

  • 28. DDoS attack detection in smart grid network using reconstructive machine learning models.
    Naqvi SSA; Li Y; Uzair M
    PeerJ Comput Sci; 2024; 10():e1784. PubMed ID: 38259891
    [TBL] [Abstract][Full Text] [Related]  

  • 29. LR-AKAP: A Lightweight and Robust Security Protocol for Smart Home Environments.
    Haseeb-Ur-Rehman RMA; Liaqat M; Aman AHM; Almazroi AA; Hasan MK; Ali Z; Ali RL
    Sensors (Basel); 2022 Sep; 22(18):. PubMed ID: 36146250
    [TBL] [Abstract][Full Text] [Related]  

  • 30. A secured authentication protocol for wireless sensor networks using elliptic curves cryptography.
    Yeh HL; Chen TH; Liu PC; Kim TH; Wei HW
    Sensors (Basel); 2011; 11(5):4767-79. PubMed ID: 22163874
    [TBL] [Abstract][Full Text] [Related]  

  • 31. An Efficient Quantum Secret Sharing Scheme Based on Restricted Threshold Access Structure.
    Li L; Li Z
    Entropy (Basel); 2023 Jan; 25(2):. PubMed ID: 36832630
    [TBL] [Abstract][Full Text] [Related]  

  • 32. Device-independent quantum secure direct communication against collective attacks.
    Zhou L; Sheng YB; Long GL
    Sci Bull (Beijing); 2020 Jan; 65(1):12-20. PubMed ID: 36659063
    [TBL] [Abstract][Full Text] [Related]  

  • 33. Encryption chain based on measurement result and its applications on semi-quantum key distribution protocol.
    Yang CW
    Sci Rep; 2022 Nov; 12(1):18381. PubMed ID: 36319692
    [TBL] [Abstract][Full Text] [Related]  

  • 34. IoMT-Based Smart Healthcare Detection System Driven by Quantum Blockchain and Quantum Neural Network.
    Qu Z; Shi W; Liu B; Gupta D; Tiwari P
    IEEE J Biomed Health Inform; 2024 Jun; 28(6):3317-3328. PubMed ID: 37399158
    [TBL] [Abstract][Full Text] [Related]  

  • 35. Hash-Chain Fog/Edge: A Mode-Based Hash-Chain for Secured Mutual Authentication Protocol Using Zero-Knowledge Proofs in Fog/Edge.
    Pardeshi MS; Sheu RK; Yuan SM
    Sensors (Basel); 2022 Jan; 22(2):. PubMed ID: 35062563
    [TBL] [Abstract][Full Text] [Related]  

  • 36. Authenticated Semi-Quantum Key Distribution Protocol Based on W States.
    Wang HW; Tsai CW; Lin J; Yang CW
    Sensors (Basel); 2022 Jul; 22(13):. PubMed ID: 35808492
    [TBL] [Abstract][Full Text] [Related]  

  • 37. A Lightweight Three-Factor Authentication and Key Agreement Scheme in Wireless Sensor Networks for Smart Homes.
    Shin S; Kwon T
    Sensors (Basel); 2019 Apr; 19(9):. PubMed ID: 31035690
    [TBL] [Abstract][Full Text] [Related]  

  • 38. Cryptanalysis and Improvement of a Privacy-Preserving Three-Factor Authentication Protocol for Wireless Sensor Networks.
    Renuka K; Kumar S; Kumari S; Chen CM
    Sensors (Basel); 2019 Oct; 19(21):. PubMed ID: 31653025
    [TBL] [Abstract][Full Text] [Related]  

  • 39. A Secure Pseudonym-Based Conditional Privacy-Preservation Authentication Scheme in Vehicular Ad Hoc Networks.
    Al-Shareeda MA; Anbar M; Manickam S; Hasbullah IH
    Sensors (Basel); 2022 Feb; 22(5):. PubMed ID: 35270843
    [TBL] [Abstract][Full Text] [Related]  

  • 40. Practical Three-Factor Authentication Protocol Based on Elliptic Curve Cryptography for Industrial Internet of Things.
    Zhao X; Li D; Li H
    Sensors (Basel); 2022 Oct; 22(19):. PubMed ID: 36236609
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 7.