These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

179 related articles for article (PubMed ID: 9304559)

  • 21. Providing integrity, authenticity, and confidentiality for header and pixel data of DICOM images.
    Al-Haj A
    J Digit Imaging; 2015 Apr; 28(2):179-87. PubMed ID: 25266442
    [TBL] [Abstract][Full Text] [Related]  

  • 22. A Mutual Authentication Framework for Wireless Medical Sensor Networks.
    Srinivas J; Mishra D; Mukhopadhyay S
    J Med Syst; 2017 May; 41(5):80. PubMed ID: 28364358
    [TBL] [Abstract][Full Text] [Related]  

  • 23. On the security of a simple three-party key exchange protocol without server's public keys.
    Nam J; Choo KK; Park M; Paik J; Won D
    ScientificWorldJournal; 2014; 2014():479534. PubMed ID: 25258723
    [TBL] [Abstract][Full Text] [Related]  

  • 24. Features for a B-ISDN telemedicine system and its application.
    Choi J; Kim Y; Lee S; Lee J; Woo J; Seo J; Yoo T; Cho H
    Stud Health Technol Inform; 1998; 52 Pt 1():307-10. PubMed ID: 10384468
    [TBL] [Abstract][Full Text] [Related]  

  • 25. MedStage--platform for information and communication in healthcare.
    Schüll H; Schmidt V
    Stud Health Technol Inform; 2000; 77():1101-5. PubMed ID: 11187491
    [TBL] [Abstract][Full Text] [Related]  

  • 26. Data privacy preservation in telemedicine: the PAIRSE project.
    Nageba E; Defude B; Morvan F; Ghedira C; Fayn J
    Stud Health Technol Inform; 2011; 169():661-5. PubMed ID: 21893830
    [TBL] [Abstract][Full Text] [Related]  

  • 27. Mechanisms of security based on digital certificates applied in a telemedicine network.
    Vivas T; Zambrano A; Huerta M
    Annu Int Conf IEEE Eng Med Biol Soc; 2008; 2008():1817-20. PubMed ID: 19163035
    [TBL] [Abstract][Full Text] [Related]  

  • 28. Applications of Multi-Channel Safety Authentication Protocols in Wireless Networks.
    Chen YL; Liau RH; Chang LY
    J Med Syst; 2016 Jan; 40(1):26. PubMed ID: 26547846
    [TBL] [Abstract][Full Text] [Related]  

  • 29. Secure Data Aggregation with Fully Homomorphic Encryption in Large-Scale Wireless Sensor Networks.
    Li X; Chen D; Li C; Wang L
    Sensors (Basel); 2015 Jul; 15(7):15952-73. PubMed ID: 26151208
    [TBL] [Abstract][Full Text] [Related]  

  • 30. Smart Home-based IoT for Real-time and Secure Remote Health Monitoring of Triage and Priority System using Body Sensors: Multi-driven Systematic Review.
    Talal M; Zaidan AA; Zaidan BB; Albahri AS; Alamoodi AH; Albahri OS; Alsalem MA; Lim CK; Tan KL; Shir WL; Mohammed KI
    J Med Syst; 2019 Jan; 43(3):42. PubMed ID: 30648217
    [TBL] [Abstract][Full Text] [Related]  

  • 31. [Security services: an overview of the French legislation on cryptography].
    Quantin C; Kerkri E; Allaert FA; Bouzelat H; Dusserre L
    Rev Epidemiol Sante Publique; 2000 Jan; 48(1):81-7. PubMed ID: 10740087
    [TBL] [Abstract][Full Text] [Related]  

  • 32. [Study on network architecture of a tele-medical information sharing platform].
    Pan L; Yu L; Chen JX
    Zhongguo Yi Liao Qi Xie Za Zhi; 2006 Jul; 30(4):293-5. PubMed ID: 17039943
    [TBL] [Abstract][Full Text] [Related]  

  • 33. Developing a Public Key Infrastructure for a secure regional e-Health environment.
    Pangalos G; Mavridis I; Ilioudis C; Georgiadis C
    Methods Inf Med; 2002; 41(5):414-8. PubMed ID: 12501814
    [TBL] [Abstract][Full Text] [Related]  

  • 34. TeleMedMail: free software to facilitate telemedicine in developing countries.
    Fraser HS; Jazayeri D; Bannach L; Szolovits P; McGrath SJ
    Stud Health Technol Inform; 2001; 84(Pt 1):815-9. PubMed ID: 11604848
    [TBL] [Abstract][Full Text] [Related]  

  • 35. Searchable and revocable multi-data owner attribute-based encryption scheme with hidden policy in cloud storage.
    Wang S; Gao T; Zhang Y
    PLoS One; 2018; 13(11):e0206126. PubMed ID: 30383840
    [TBL] [Abstract][Full Text] [Related]  

  • 36. Secure and Efficient Two-Factor User Authentication Scheme with User Anonymity for Network Based E-Health Care Applications.
    Li X; Niu J; Karuppiah M; Kumari S; Wu F
    J Med Syst; 2016 Dec; 40(12):268. PubMed ID: 27734256
    [TBL] [Abstract][Full Text] [Related]  

  • 37. A strategy for the development of secure telemedicine applications.
    Raman RS; Reddy R; Jagannathan V; Reddy S; Cleetus KJ; Srinivas K
    Proc AMIA Annu Fall Symp; 1997; ():344-8. PubMed ID: 9357645
    [TBL] [Abstract][Full Text] [Related]  

  • 38. Research on medical image encryption in telemedicine systems.
    Dai Y; Wang H; Zhou Z; Jin Z
    Technol Health Care; 2016 Apr; 24 Suppl 2():S435-42. PubMed ID: 27163302
    [TBL] [Abstract][Full Text] [Related]  

  • 39. Specific interoperability problems of security infrastructure services.
    Pharow P; Blobel B
    Stud Health Technol Inform; 2006; 121():349-63. PubMed ID: 17095833
    [TBL] [Abstract][Full Text] [Related]  

  • 40. Cryptanalysis and Enhancement of Anonymity Preserving Remote User Mutual Authentication and Session Key Agreement Scheme for E-Health Care Systems.
    Amin R; Islam SK; Biswas GP; Khan MK; Li X
    J Med Syst; 2015 Nov; 39(11):140. PubMed ID: 26342492
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 9.