Results 101 to 110 of about 29,404 (289)
The role of lipid metabolism in neuronal senescence
Disrupted lipid metabolism, through alterations in lipid species or lipid droplet accumulation, can drive neuronal senescence. However, lipid dyshomeostasis can also occur alongside neuronal senescence, further amplifying tissue damage. Delineating how lipid‐induced senescence emerges in neurons and glial cells, and how it contributes to ageing and ...
Dikaia Tsagkari +2 more
wiley +1 more source
Data security and privacy concerns are important issues in cloud storage. In this paper, we propose a verifiable public key encryption with keyword search based on homomorphic encryption in multi-user setting.
D. N. Wu, Q. Q. Gan, X. M. Wang
doaj +1 more source
On the Relations Between Diffie-Hellman and ID-Based Key Agreement from Pairings [PDF]
This paper studies the relationships between the traditional Diffie-Hellman key agreement protocol and the identity-based (ID-based) key agreement protocol from pairings.
Wang, Shengbao
core +2 more sources
Provably Secure Authenticated Encryption
Authenticated Encryption (AE) is a symmetric key cryptographic primitive that ensures confidentiality and authenticity of processed messages at the same time. The research of AE as a primitive in its own right started in 2000. The security goals of AE were captured in formal definitions in the tradition in the tradition of provable security (such as ...
openaire +1 more source
ZFAS1 is a lncRNA promoting cell proliferation and migration, exhibiting high expression in various cancers. It is conserved, widely expressed, and produces multiple splice variants with unclear roles. We identified several splice variants in hepatocyte models, and found that inhibiting or suppressing regulators of the unfolded protein response (PERK ...
Sébastien Soubeyrand +2 more
wiley +1 more source
Methods of Generating Key Sequences Based on Parameters of Handwritten Passwords and Signatures
The modern encryption methods are reliable if strong keys (passwords) are used, but the human factor issue cannot be solved by cryptographic methods.
Pavel Lozhnikov +3 more
doaj +1 more source
BMI‐1 modulation and trafficking during M phase in diffuse intrinsic pontine glioma
The schematic illustrates BMI‐1 phosphorylation during M phase, which triggers its translocation from the nucleus to the cytoplasm. In cycling cells, BMI‐1 functions within the PRC1 complex to mediate H2A K119 monoubiquitination. Following PTC596‐induced M phase arrest, phosphorylated BMI‐1 dissociates from PRC1 and is exported to the cytoplasm via its
Banlanjo Umaru +6 more
wiley +1 more source
Adaptive authentication and key agreement mechanism for future cellular systems [PDF]
Since the radio medium can be accessed by anyone, authentication of users is a very important element of a mobile network. Nowadays, in GSM/GPRS a challenge response protocol is used to authenticate the user to the mobile network.
Dimitriou, T., Komninos, N.
core
An Improved Authenticated Encryption Scheme
Authenticated encryption schemes are very useful for private and authenticated communication. In 2010, Rasslan and Youssef showed that the Hwang et al.'s authenticated encryption scheme is not secure by presenting a message forgery attack. However, Rasslan and Youssef did not give how to solve the security issue.
Fagen LI, Jiang DENG, Tsuyoshi TAKAGI
openaire +2 more sources
A regulatory axis involving APE1, AUF1, and miR‐221 is proposed. Pri‐miR‐221 is processed by DROSHA and DICER to generate mature miR‐221, which targets p27Kip1 mRNA. APE1 and AUF1 compete for pre‐miR‐221 binding. Reduced APE1/AUF1 levels impair miR‐221 biogenesis, decrease p27Kip1 mRNA degradation, and promote cell cycle progression, chemoresistance ...
Matilde Clarissa Malfatti +3 more
wiley +1 more source

