Results 101 to 110 of about 40,263 (275)
Multi-authority Attribute Based Encryption [PDF]
In an identity based encryption scheme, each user is identified by a unique identity string. An attribute based encryption scheme (ABE), in contrast, is a scheme in which each user is identified by a set of attributes, and some function of those attributes is used to determine decryption ability for each ciphertext. Sahai and Waters introduced a single
openaire +1 more source
ZFAS1 is a lncRNA promoting cell proliferation and migration, exhibiting high expression in various cancers. It is conserved, widely expressed, and produces multiple splice variants with unclear roles. We identified several splice variants in hepatocyte models, and found that inhibiting or suppressing regulators of the unfolded protein response (PERK ...
Sébastien Soubeyrand +2 more
wiley +1 more source
Revocable and Traceable Undeniable Attribute-Based Encryption in Cloud-Enabled E-Health Systems. [PDF]
He Z, Chen Y, Luo Y, Zhang L, Tang Y.
europepmc +1 more source
BMI‐1 modulation and trafficking during M phase in diffuse intrinsic pontine glioma
The schematic illustrates BMI‐1 phosphorylation during M phase, which triggers its translocation from the nucleus to the cytoplasm. In cycling cells, BMI‐1 functions within the PRC1 complex to mediate H2A K119 monoubiquitination. Following PTC596‐induced M phase arrest, phosphorylated BMI‐1 dissociates from PRC1 and is exported to the cytoplasm via its
Banlanjo Umaru +6 more
wiley +1 more source
An Access Control Scheme Based on Blockchain and Ciphertext Policy-Attribute Based Encryption. [PDF]
Hu R +6 more
europepmc +1 more source
Amino acids sequence of two different proteins with the same sequence (chameleon sequence—black boxes) represent in 3D structure of the proteins different secondary structures: HHHH—helical and BBB—Beta‐structural. The chains folded in water environment adopt different III‐order structures in which the chameleon fragments appear to adopt similar status
Irena Roterman +4 more
wiley +1 more source
A revocable attribute-based encryption EHR sharing scheme with multiple authorities in blockchain. [PDF]
Yang X, Li W, Fan K.
europepmc +1 more source
ERα splice variant ERα∆7 lacks the C‐terminus, and its expression may change phenotypes of breast cancers. Our results showed that ERα∆7 is found in the luminal A subtype, and elevated ERα∆7 levels are linked to improved cell survival with lower proliferation and migration.
Long Wai Tsui +10 more
wiley +1 more source
Accelerated algorithm in attribute-based encryption over cloud environment
Cloud computing provides storage,computing and network services to tenants.Data security and data sharing and access control between tenants are indispensable functions.Attribute-based encryption (ABE) system is a one to many encryption system,which ...
Guowei WU +5 more
doaj +2 more sources
Efficient lattice-based revocable attribute-based encryption against decryption key exposure for cloud file sharing. [PDF]
Huang B, Gao J, Li X.
europepmc +1 more source

