Results 171 to 180 of about 420,085 (316)
IoT Authentication in Federated Learning: Methods, Challenges, and Future Directions. [PDF]
Badhib A, Alshehri S, Cherif A.
europepmc +1 more source
We show that the majority of the 18 analyzed recurrent cancer‐associated ERBB4 mutations are transforming. The most potent mutations are activating, co‐operate with other ERBB receptors, and are sensitive to pan‐ERBB inhibitors. Activating ERBB4 mutations also promote therapy resistance in EGFR‐mutant lung cancer.
Veera K. Ojala +15 more
wiley +1 more source
A Lightweight Authentication and Key Distribution Protocol for XR Glasses Using PUF and Cloud-Assisted ECC. [PDF]
Cha W, Lee HJ, Kook S, Kim K, Won D.
europepmc +1 more source
The verification of tunnel methods of the Extensible Authentication Protocol (EAP)
Alexei Viacheslavovich Nikeshin +1 more
openalex +1 more source
Peroxidasin enables melanoma immune escape by inhibiting natural killer cell cytotoxicity
Peroxidasin (PXDN) is secreted by melanoma cells and binds the NK cell receptor NKG2D, thereby suppressing NK cell activation and cytotoxicity. PXDN depletion restores NKG2D signaling and enables effective NK cell–mediated melanoma killing. These findings identify PXDN as a previously unrecognized immune evasion factor and a potential target to improve
Hsu‐Min Sung +17 more
wiley +1 more source
Lightweight three-factor authentication protocol for 6G-enabled healthcare systems using Chebyshev chaotic maps and BioHashing. [PDF]
Abbas AM, Nasr ME, Abdelfatah RI.
europepmc +1 more source
Standardization of Polymerase Chain Reaction Assay for the Authentication of Arapaima gigas fish
Wanessa Shuelen Costa Araújo +6 more
openalex +2 more sources
Single circulating tumor cells (sCTCs) from high‐grade serous ovarian cancer patients were enriched, imaged, and genomically profiled using WGA and NGS at different time points during treatment. sCTCs revealed enrichment of alterations in Chromosomes 2, 7, and 12 as well as persistent or emerging oncogenic CNAs, supporting sCTC identity.
Carolin Salmon +9 more
wiley +1 more source
Multi-factor authentication and key agreement scheme based on PUF and Chebyshev chaotic map for wireless sensor networks. [PDF]
Wang L, Han C.
europepmc +1 more source

