Results 81 to 90 of about 696,470 (284)
Nanosecond infrared laser (NIRL) low‐volume sampling combined with shotgun lipidomics uncovers distinct lipidome alterations in oropharyngeal squamous cell carcinoma (OPSCC) of the palatine tonsil. Several lipid species consistently differentiate tumor from healthy tissue, highlighting their potential as diagnostic markers.
Leonard Kerkhoff +11 more
wiley +1 more source
An Epitome of Multi Secret Sharing Schemes for General Access Structure [PDF]
Secret sharing schemes are widely used now a days in various applications, which need more security, trust and reliability. In secret sharing scheme, the secret is divided among the participants and only authorized set of participants can recover the ...
Binu, V P, Sreekumar, A
core
Confidentiality-Preserving Publish/Subscribe: A Survey
Publish/subscribe (pub/sub) is an attractive communication paradigm for large-scale distributed applications running across multiple administrative domains.
Felber, Pascal +3 more
core +1 more source
Cloud computing is an eminent technology for providing a data storage facility with efficient storage, maintenance, management and remote backups. Hence, user data are shifted from customary storage to cloud storage.
M. Sumathi, S. Sangeetha
semanticscholar +1 more source
Aptamers are used both therapeutically and as targeting agents in cancer treatment. We developed an aptamer‐targeted PLGA–TRAIL nanosystem that exhibited superior therapeutic efficacy in NOD/SCID breast cancer models. This nanosystem represents a novel biotechnological drug candidate for suppressing resistance development in breast cancer.
Gulen Melike Demirbolat +8 more
wiley +1 more source
Auditable Anonymous Electronic Examination
Ensuring security in electronic examination systems represents a significant challenge, particularly when practical considerations dictate that most involved parties cannot be fully trusted due to self-interest.
Ádám Vécsi, Attila Pethő
doaj +1 more source
A Generic Framework for Sharing Data Using Attribute Based Cryptography in Hybrid Cloud
Now a days, large organizations are re-appropriating their information to the public cloud. But we should be cautious and improve the security about the data which is being shared. Maintaining the confidentiality among this public data is a major concern.
E. Poornima +3 more
openaire +1 more source
ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments [PDF]
The enforcement of security policies in outsourced environments is still an open challenge for policy-based systems. On the one hand, taking the appropriate security decision requires access to the policies.
Asghar, Muhammad Rizwan +3 more
core +1 more source
In this explorative study, the abundance of circular RNA molecules in bone marrow stem cells was found to be elevated in patients with high‐risk myelodysplastic neoplasms, and to be associated with an increased risk of progression to acute myeloid leukemia.
Eileen Wedge +17 more
wiley +1 more source
Delegation and tracing for attribute-based cryptography
Le nombre d’appareils connectés par personne a massivement augmenté lors de la dernière décennie, en particulier dans les pays occidentaux. Étant donné que la sécurité des structures connectées au réseau peut être compromise à partir de n’importe quel point d’entrée par un attaquant malveillant, la sécurisation des trousseaux de clefs cryptographiques ...
openaire +1 more source

