These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

113 related articles for article (PubMed ID: 39282806)

  • 1. A novel AES-DES with improved Cheetah optimisation algorithm for secured medical data transmission in cloud environment.
    Joel G; Manikanta Kasyap CVN; Sidiq SA; Riyaz J; Santhi Sri T; Sreedevi P
    J Med Eng Technol; 2024 Apr; 48(3):100-117. PubMed ID: 39282806
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Hybrid Technique for Cyber-Physical Security in Cloud-Based Smart Industries.
    Garg D; Rani S; Herencsar N; Verma S; Wozniak M; Ijaz MF
    Sensors (Basel); 2022 Jun; 22(12):. PubMed ID: 35746411
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Using Identity-Based Cryptography as a Foundation for an Effective and Secure Cloud Model for E-Health.
    Mittal S; Bansal A; Gupta D; Juneja S; Turabieh H; Elarabawy MM; Sharma A; Bitsue ZK
    Comput Intell Neurosci; 2022; 2022():7016554. PubMed ID: 35510050
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Key Aggregation Cryptosystem and Double Encryption Method for Cloud-Based Intelligent Machine Learning Techniques-Based Health Monitoring Systems.
    Almuzaini KK; Sinhal AK; Ranjan R; Goel V; Shrivastava R; Halifa A
    Comput Intell Neurosci; 2022; 2022():3767912. PubMed ID: 35498196
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Integrating meta-heuristic with named data networking for secure edge computing in IoT enabled healthcare monitoring system.
    Manogaran N; Nandagopal M; Abi NE; Seerangan K; Balusamy B; Selvarajan S
    Sci Rep; 2024 Sep; 14(1):21532. PubMed ID: 39278954
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Efficient and Secure Privacy Analysis for Medical Big Data Using TDES and MKSVM with Access Control in Cloud.
    Shanmugapriya E; Kavitha R
    J Med Syst; 2019 Jul; 43(8):265. PubMed ID: 31273467
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Data Access Control and Secured Data Sharing Approach for Health Care Data in Cloud Environment.
    Pugazhenthi A; Chitra D
    J Med Syst; 2019 Jul; 43(8):258. PubMed ID: 31264005
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Analytical Study of Hybrid Techniques for Image Encryption and Decryption.
    Chowdhary CL; Patel PV; Kathrotia KJ; Attique M; P K; Ijaz MF
    Sensors (Basel); 2020 Sep; 20(18):. PubMed ID: 32927714
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Optimization of a Deep Learning Algorithm for Security Protection of Big Data from Video Images.
    Geng Q; Yan H; Lu X
    Comput Intell Neurosci; 2022; 2022():3394475. PubMed ID: 35300398
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Unified Fine-Grained Access Control for Personal Health Records in Cloud Computing.
    Li W; Liu BM; Liu D; Liu RP; Wang P; Luo S; Ni W
    IEEE J Biomed Health Inform; 2019 May; 23(3):1278-1289. PubMed ID: 29994490
    [TBL] [Abstract][Full Text] [Related]  

  • 11. SecureMed: Secure Medical Computation Using GPU-Accelerated Homomorphic Encryption Scheme.
    Khedr A; Gulak G
    IEEE J Biomed Health Inform; 2018 Mar; 22(2):597-606. PubMed ID: 28129194
    [TBL] [Abstract][Full Text] [Related]  

  • 12. A secured cryptographic system based on DNA and a hybrid key generation approach.
    Indrasena Reddy M; Siva Kumar AP; Subba Reddy K
    Biosystems; 2020 Nov; 197():104207. PubMed ID: 32653339
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Meeting the security requirements of electronic medical records in the ERA of high-speed computing.
    Alanazi HO; Zaidan AA; Zaidan BB; Kiah ML; Al-Bakri SH
    J Med Syst; 2015 Jan; 39(1):165. PubMed ID: 25481568
    [TBL] [Abstract][Full Text] [Related]  

  • 14. A robust algorithm for authenticated health data access via blockchain and cloud computing.
    Shahzad A; Chen W; Shaheen M; Zhang Y; Ahmad F
    PLoS One; 2024; 19(9):e0307039. PubMed ID: 39312513
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Enhancement of the CAST Block Algorithm Based on Novel S-Box for Image Encryption.
    Ali RS; Akif OZ; Jassim SA; Farhan AK; El-Kenawy EM; Ibrahim A; Ghoneim ME; Abdelhamid AA
    Sensors (Basel); 2022 Nov; 22(21):. PubMed ID: 36366230
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Secure medical information sharing in cloud computing.
    Shao Z; Yang B; Zhang W; Zhao Y; Wu Z; Miao M
    Technol Health Care; 2015; 23 Suppl 1():S133-7. PubMed ID: 26410315
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Double images encryption method with resistance against the specific attack based on an asymmetric algorithm.
    Wang X; Zhao D
    Opt Express; 2012 May; 20(11):11994-2003. PubMed ID: 22714185
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Securing Personal Health Record System in Cloud Using User Usage Based Encryption.
    Suresh D; Florence ML
    J Med Syst; 2019 May; 43(6):171. PubMed ID: 31065802
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Secure Collaborative Platform for Health Care Research in an Open Environment: Perspective on Accountability in Access Control.
    Kang G; Kim YG
    J Med Internet Res; 2022 Oct; 24(10):e37978. PubMed ID: 36240003
    [TBL] [Abstract][Full Text] [Related]  

  • 20. A double encryption protection algorithm for stem cell bank privacy data based on improved AES and chaotic encryption technology.
    Wang L; Wei X; Zhang Y; Gao Y; Niu Q
    PLoS One; 2023; 18(10):e0293418. PubMed ID: 37878640
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 6.