Results 91 to 100 of about 118,033 (317)
In Machine-to-Machine (M2M) communications, authentication of a device is of upmost importance for applications of Internet of Things. As traditional authentication schemes always assume the presence of a person, most authentication technologies cannot ...
Wei Ren, Linchen Yu, Liangli Ma, Yi Ren
doaj +1 more source
NAD+ regeneration by mitochondrial complex I NADH dehydrogenase is important for cancer cell proliferation. Specifically, NAD+ is necessary for the activities of NAD+‐dependent deacetylases SIRT3 and SIRT7, which suppress the expression of p21Cip1 cyclin‐dependent kinase inhibitor, an antiproliferative molecule, at the translational and transcriptional
Masato Higurashi+5 more
wiley +1 more source
Clinical utility of cerebrospinal fluid biomarkers measured by LUMIPULSE® system
Abstract Objectives Cerebrospinal fluid (CSF) biomarkers of Alzheimer's disease (AD) are well‐established in research settings, but their use in routine clinical practice remains a largely unexploited potential. Here, we examined the relationship between CSF biomarkers, measured by a fully automated immunoassay platform, and brain β‐amyloid (Aβ ...
Hisashi Nojima+9 more
wiley +1 more source
Epithelial–mesenchymal transition (EMT) and tumor‐infiltrating lymphocytes (TILs) are associated with early breast cancer response to neoadjuvant chemotherapy (NAC). This study evaluated EMT and TIL shifts, with immunofluorescence and RNA sequencing, at diagnosis and in residual tumors as potential biomarkers associated with treatment response.
Françoise Derouane+16 more
wiley +1 more source
Vascular endothelial‐cadherin as a marker of endothelial injury in preclinical Alzheimer disease
Abstract Objective Endothelial dysfunction is an early and prevalent pathology in Alzheimer disease (AD). We here investigate the value of vascular endothelial‐cadherin (VEC) as a cerebrospinal fluid (CSF) marker of endothelial injury in preclinical AD.
Rawan Tarawneh+5 more
wiley +1 more source
Language and Authenticity [PDF]
It is argued that the analysis of language should play a central role in the study of social psychological phenomenon. For example, there is evidence that habitual inauthenticity in the use of language which was practised in the Eastern and Central European totalitarian systems was partly related to the breakdown of moral principles and to the loss of ...
openaire +3 more sources
Good Vibes! Towards Phone-to-User Authentication Through Wristwatch Vibrations [PDF]
While mobile devices frequently require users to authenticate to prevent unauthorized access, mobile devices typically do not authenticate to their users. This leaves room for users to unwittingly interact with different mobile devices. We present GoodVibes authentication, a variant of mobile device-to-user authentication, where the user's phone ...
arxiv
Molecular and functional profiling unravels targetable vulnerabilities in colorectal cancer
We used whole exome and RNA‐sequencing to profile divergent genomic and transcriptomic landscapes of microsatellite stable (MSS) and microsatellite instable (MSI) colorectal cancer. Alterations were classified using a computational score for integrative cancer variant annotation and prioritization.
Efstathios‐Iason Vlachavas+15 more
wiley +1 more source
The clinical spectrum of SMA‐PME and in vitro normalization of its cellular ceramide profile
Abstract Objective The objectives of this study were to define the clinical and biochemical spectrum of spinal muscular atrophy with progressive myoclonic epilepsy (SMA‐PME) and to determine if aberrant cellular ceramide accumulation could be normalized by enzyme replacement.
Michelle M. Lee+16 more
wiley +1 more source
On the Use of Key Assignment Schemes in Authentication Protocols [PDF]
Key Assignment Schemes (KASs) have been extensively studied in the context of cryptographically-enforced access control, where derived keys are used to decrypt protected resources. In this paper, we explore the use of KASs in entity authentication protocols, where we use derived keys to encrypt challenges.
arxiv