These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
114 related articles for article (PubMed ID: 39314715)
1. Key derivation function: key-hash based computational extractor and stream based pseudorandom expander. Chuah CW; Harun NZ; Hamid IRA PeerJ Comput Sci; 2024; 10():e2249. PubMed ID: 39314715 [TBL] [Abstract][Full Text] [Related]
2. Design and Analysis of Area and Energy Efficient Reconfigurable Cryptographic Accelerator for Securing IoT Devices. Zhang X; Liu B; Zhao Y; Hu X; Shen Z; Zheng Z; Liu Z; Chong KS; Yu G; Wang C; Zou X Sensors (Basel); 2022 Nov; 22(23):. PubMed ID: 36501862 [TBL] [Abstract][Full Text] [Related]
3. Improved 2-round collision attack on IoT hash standard ASCON-HASH. Zhai D; Bai W; Fu J; Gao H; Zhu X Heliyon; 2024 Mar; 10(5):e26119. PubMed ID: 38434343 [TBL] [Abstract][Full Text] [Related]
4. Hash-Chain Fog/Edge: A Mode-Based Hash-Chain for Secured Mutual Authentication Protocol Using Zero-Knowledge Proofs in Fog/Edge. Pardeshi MS; Sheu RK; Yuan SM Sensors (Basel); 2022 Jan; 22(2):. PubMed ID: 35062563 [TBL] [Abstract][Full Text] [Related]
5. A Lightweight Protocol for Secure Video Streaming. Venčkauskas A; Morkevicius N; Bagdonas K; Damaševičius R; Maskeliūnas R Sensors (Basel); 2018 May; 18(5):. PubMed ID: 29757988 [TBL] [Abstract][Full Text] [Related]
6. K-XMSS and K-SPHINCS Sim M; Eum S; Song G; Yang Y; Kim W; Seo H Sensors (Basel); 2023 Aug; 23(17):. PubMed ID: 37688014 [TBL] [Abstract][Full Text] [Related]
7. Dependable and Provable Secure Two-Factor Mutual Authentication Scheme Using ECC for IoT-Based Telecare Medical Information System. Radhakrishnan N; Muniyandi AP J Healthc Eng; 2022; 2022():9273662. PubMed ID: 35198134 [TBL] [Abstract][Full Text] [Related]
8. Designing Two Secure Keyed Hash Functions Based on Sponge Construction and the Chaotic Neural Network. Abdoun N; El Assad S; Manh Hoang T; Deforges O; Assaf R; Khalil M Entropy (Basel); 2020 Sep; 22(9):. PubMed ID: 33286780 [TBL] [Abstract][Full Text] [Related]
9. Patients' Data Management System Protected by Identity-Based Authentication and Key Exchange. Rivero-García A; Santos-González I; Hernández-Goya C; Caballero-Gil P; Yung M Sensors (Basel); 2017 Mar; 17(4):. PubMed ID: 28362328 [TBL] [Abstract][Full Text] [Related]
10. SE-CPPA: A Secure and Efficient Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks. Al-Shareeda MA; Anbar M; Manickam S; Hasbullah IH Sensors (Basel); 2021 Dec; 21(24):. PubMed ID: 34960311 [TBL] [Abstract][Full Text] [Related]
11. Enhancing Security in ZigBee Wireless Sensor Networks: A New Approach and Mutual Authentication Scheme for D2D Communication. Allakany A; Saber A; Mostafa SM; Alsabaan M; Ibrahem MI; Elwahsh H Sensors (Basel); 2023 Jun; 23(12):. PubMed ID: 37420868 [TBL] [Abstract][Full Text] [Related]
12. Unconditionally Secure Ciphers with a Short Key for a Source with Unknown Statistics. Ryabko B Entropy (Basel); 2023 Sep; 25(10):. PubMed ID: 37895527 [TBL] [Abstract][Full Text] [Related]
13. A Secure Pseudonym-Based Conditional Privacy-Preservation Authentication Scheme in Vehicular Ad Hoc Networks. Al-Shareeda MA; Anbar M; Manickam S; Hasbullah IH Sensors (Basel); 2022 Feb; 22(5):. PubMed ID: 35270843 [TBL] [Abstract][Full Text] [Related]
14. BRISK: Dynamic Encryption Based Cipher for Long Term Security. Dwivedi AD Sensors (Basel); 2021 Aug; 21(17):. PubMed ID: 34502635 [TBL] [Abstract][Full Text] [Related]
15. Bases selection with pseudo-random functions in BB84 scheme. Dervisevic E; Voznak M; Mehic M Heliyon; 2024 Jan; 10(1):e23578. PubMed ID: 38173502 [TBL] [Abstract][Full Text] [Related]
16. Lightweight Hash-Based Authentication Protocol for Smart Grids. Kook S; Kim K; Ryu J; Lee Y; Won D Sensors (Basel); 2024 May; 24(10):. PubMed ID: 38793939 [TBL] [Abstract][Full Text] [Related]
18. Cryptographic framework for document-objects resulting from multiparty collaborative transactions. Goh A Stud Health Technol Inform; 2000; 77():1069-73. PubMed ID: 11187485 [TBL] [Abstract][Full Text] [Related]
19. Understanding security failures of two authentication and key agreement schemes for telecare medicine information systems. Mishra D J Med Syst; 2015 Mar; 39(3):19. PubMed ID: 25651950 [TBL] [Abstract][Full Text] [Related]
20. A lightweight security framework for electronic healthcare system. Chaudhary RRK; Chatterjee K Int J Inf Technol; 2022; 14(6):3109-3121. PubMed ID: 35912035 [TBL] [Abstract][Full Text] [Related] [Next] [New Search]