Results 61 to 70 of about 355,842 (292)

Hyperosmotic stress induces PARP1‐mediated HPF1‐dependent mono(ADP‐ribosyl)ation

open access: yesFEBS Letters, EarlyView.
Sorbitol‐induced hyperosmotic stress rapidly induces reversible mono(ADP‐ribosyl)ation (MARylation) on PARP1 without the signs of genotoxic signaling. We show that PARP1 autoMARylation is HPF1 dependent and forms hydroxylamine‐resistant O‐glycosidic linkages.
Anna Georgina Kopasz   +11 more
wiley   +1 more source

Authentication of Insect-Based Products in Food and Feed: A Benchmark Survey

open access: yesInsects
The consumption and farming of insects are gaining global attention as sustainable alternatives to conventional protein sources. Industrial processing of insects into powders or pastes complicates species identification, raising concerns about product ...
Aline Marien   +7 more
doaj   +1 more source

Quantification and Classification of Corn and Sunflower Oils as Adulterants in Olive Oil Using Chemometrics and FTIR Spectra

open access: yesThe Scientific World Journal, 2012
Commercially, extra virgin olive oil (EVOO) is subjected to be adulterated with low-price oils having similar color to EVOO. Fourier transform infrared (FTIR) spectroscopy combined with chemometrics has been successfully used for classification and ...
Abdul Rohman, Y. B. Che Man
doaj   +1 more source

Linking neurogenesis, oligodendrogenesis, and myelination defects to neurodevelopmental disruption in primary mitochondrial disorders

open access: yesFEBS Letters, EarlyView.
Mitochondrial remodeling shapes neural and glial lineage progression by matching metabolic supply with demand. Elevated OXPHOS supports differentiation and myelin formation, while myelin compaction lowers mitochondrial dependence, revealing mitochondria as key drivers of developmental energy adaptation.
Sahitya Ranjan Biswas   +3 more
wiley   +1 more source

Attacks on quantum key distribution protocols that employ non-ITS authentication

open access: yes, 2015
We demonstrate how adversaries with unbounded computing resources can break Quantum Key Distribution (QKD) protocols which employ a particular message authentication code suggested previously.
A Abidin   +25 more
core   +1 more source

Authentication and authenticated key exchanges [PDF]

open access: yesDesigns, Codes and Cryptography, 1992
We discuss two-party mutual authentication protocols providing authenticated key exchange, focusing on those using asymmetric techniques. A simple, efficient protocol referred to as the station-to-station (STS) protocol is introduced, examined in detail, and considered in relation to existing protocols. The definition of a secure protocol is considered,
Whitfield Diffie   +2 more
openaire   +1 more source

An isoform of 14‐3‐3 protein regulates transbilayer lipid movement at the plasma membrane

open access: yesFEBS Letters, EarlyView.
Loss of 14‐3‐3ζ in CHO cells confers resistance to exogenous phosphatidylserine (PS) and impairs endocytosis‐independent inward flip‐flop of fluorescent PS at the plasma membrane. RNAi‐mediated knockdown reproduces this defect, while no additive effect is seen in ATP11C‐deficient cells.
Akiko Yamaji‐Hasegawa   +3 more
wiley   +1 more source

The ubiquitin ligase RNF115 is required for the clearance of damaged lysosomes

open access: yesFEBS Letters, EarlyView.
Upon lysosomal rupture, an E3 ubiquitin ligase RNF115 translocates from the cytosol to the damaged lysosomal membrane. Moreover, RNF115 depletion impairs the clearance of damaged lysosomes, identifying it as a key regulator of lysosomal quality control.
Sae Nakanaga   +3 more
wiley   +1 more source

Redox mechanism of glycerophospholipids and relevant targeted therapy in ferroptosis

open access: yesCell Death Discovery
Ferroptosis, an iron-dependent form of regulated cell death driven by redox dysregulation, is defined by iron overload, reactive oxygen species overproduction, and subsequent peroxidation of polyunsaturated fatty acid-containing phospholipids, notably ...
Shuwei Chang   +5 more
doaj   +1 more source

Gathering realistic authentication performance data through field trials [PDF]

open access: yes, 2010
Most evaluations of novel authentication mechanisms have been conducted under laboratory conditions. We argue that the results of short-term usage under laboratory conditions do not predict user performance “in the wild”, because there is insufficient ...
Beautement, A, Sasse, MA
core   +1 more source

Home - About - Disclaimer - Privacy