Results 71 to 80 of about 241,807 (271)
Hybrid Authentication Scheme for VANET Based on Trusted Exchange Pseudonym [PDF]
Two types of schemes based on pseudonym authentication and group signature authentication are compared and analyzed.This paper proposes a hybrid authentication scheme.The model builds an exchange protocol for exchanging pseudonym between adjacent nodes ...
WANG Ziwang,XU Yang,XIE Xiaoyao,ZHANG Shuai,CHEN Yi
doaj +1 more source
Subtype‐specific enhancer RNAs define transcriptional regulators and prognosis in breast cancers
This study employed machine learning methodologies to perform the subtype‐specific classification of RNA‐seq data sets, which are mapped on enhancers from TCGA‐derived breast cancer patients. Their integration with gene expression (referred to as ProxCReAM eRNAs) and chromatin accessibility profiles has the potential to identify lineage‐specific and ...
Aamena Y. Patel +6 more
wiley +1 more source
Ubic: Bridging the gap between digital cryptography and the physical world
Advances in computing technology increasingly blur the boundary between the digital domain and the physical world. Although the research community has developed a large number of cryptographic primitives and has demonstrated their usability in all ...
D.M. Freeman +6 more
core +1 more source
Aldehyde dehydrogenase 1A1 (ALDH1A1) is a cancer stem cell marker in several malignancies. We established a novel epithelial cell line from rectal adenocarcinoma with unique overexpression of this enzyme. Genetic attenuation of ALDH1A1 led to increased invasive capacity and metastatic potential, the inhibition of proliferation activity, and ultimately ...
Martina Poturnajova +25 more
wiley +1 more source
Secure and Privacy-Preserving Attribute-Based Sharing Framework in Vehicles Ad Hoc Networks
In the vehicle communications, vehicle-to-vehicle interconnection has extraordinary significance for improving the quality of transportation services and ensuring effective and safe information sharing between vehicles.
Leyou Zhang, Jun Wang, Yi Mu
doaj +1 more source
Tumors contain diverse cellular states whose behavior is shaped by context‐dependent gene coordination. By comparing gene–gene relationships across biological contexts, we identify adaptive transcriptional modules that reorganize into distinct vulnerability axes.
Brian Nelson +9 more
wiley +1 more source
In this comment paper, we point out a security flaw in a data access control system which is built on ciphertext-policy attribute-based encryption (CP-ABE) and attribute-based signature schemes.
Syh-Yuan Tan
doaj +1 more source
Engineering Object-Oriented Semantics Using Graph Transformations [PDF]
In this paper we describe the application of the theory of graph transformations to the practise of language design. We have defined the semantics of a small but realistic object-oriented language (called TAAL) by mapping the language constructs to ...
Kastenberg, H. +2 more
core +1 more source
COMP–PMEPA1 axis promotes epithelial‐to‐mesenchymal transition in breast cancer cells
This study reveals that cartilage oligomeric matrix protein (COMP) promotes epithelial‐to‐mesenchymal transition (EMT) in breast cancer. We identify PMEPA1 (protein TMEPAI) as a novel COMP‐binding partner that mediates EMT via binding to the TSP domains of COMP, establishing the COMP–PMEPA1 axis as a key EMT driver in breast cancer.
Konstantinos S. Papadakos +6 more
wiley +1 more source
SDN control and forwarding method based on identity attribute
Due to the lack of effective data source authentication mechanism and the limited matching fields in software defined networking (SDN),an SDN security control and forwarding method based on identity attribute was proposed.Attribute identification and ...
Xianwei ZHU +3 more
doaj +2 more sources

