Results 151 to 160 of about 118,033 (317)
An Extension to HTTP : Digest Access Authentication [PDF]
J. Franks+6 more
openalex +1 more source
This article advocates integrating temporal dynamics into cancer research. Rather than relying on static snapshots, researchers should increasingly consider adopting dynamic methods—such as live imaging, temporal omics, and liquid biopsies—to track how tumors evolve over time.
Gautier Follain+3 more
wiley +1 more source
Multi-layered Authentication and Key Management Scheme for Secure IoV [PDF]
The rapid development of Vehicular Ad-hoc Networks (VANETs) within the Internet of Vehicles (IoV) necessitates efficient and secure authentication methods to support high-speed, high-density environments. Current group authentication schemes provide user identity protection and unlinkability but face limitations, such as reliance on a central group ...
arxiv
Inhibitor of DNA binding‐1 is a key regulator of cancer cell vasculogenic mimicry
Elevated expression of transcriptional regulator inhibitor of DNA binding 1 (ID1) promoted cancer cell‐mediated vasculogenic mimicry (VM) through regulation of pro‐angiogenic and pro‐cancerous genes (e.g. VE‐cadherin (CDH5), TIE2, MMP9, DKK1). Higher ID1 expression also increased metastases to the lung and the liver.
Emma J. Thompson+11 more
wiley +1 more source
Authentication of Straight Whiskey by Determination of the Ratio of Furfural to 5-Hydroxymethyl-2-Furaldehyde [PDF]
James Jaganathan, Sumer M Dugar
openalex +1 more source
B‐cell chronic lymphocytic leukemia (B‐CLL) and monoclonal B‐cell lymphocytosis (MBL) show altered proteomes and phosphoproteomes, analyzed using mass spectrometry, protein microarrays, and western blotting. Identifying 2970 proteins and 316 phosphoproteins, including 55 novel phosphopeptides, we reveal BCR and NF‐kβ/STAT3 signaling in disease ...
Paula Díez+17 more
wiley +1 more source
Three-party password authenticated key agreement protocol with user anonymity based on lattice
With the rapid development of quantum theory and the existence of polynomial algorithm in quantum computation based on discrete logarithm problem and large integer decomposition problem,the security of the algorithm was seriously threatened.Therefore,two
Caifen WANG, Li CHEN
doaj +2 more sources
Combinatorial Bounds for Authentication Codes with Arbitration [PDF]
Kaoru Kurosawa, Satoshi Obana
openalex +1 more source
Ubiquitination of transcription factors in cancer: unveiling therapeutic potential
In cancer, dysregulated ubiquitination of transcription factors contributes to the uncontrolled growth and survival characteristics of tumors. Tumor suppressors are degraded by aberrant ubiquitination, or oncogenic transcription factors gain stability through ubiquitination, thereby promoting tumorigenesis.
Dongha Kim, Hye Jin Nam, Sung Hee Baek
wiley +1 more source