Results 81 to 90 of about 95,826 (286)
lwAKE: A Lightweight Authenticated Key Exchange for Class 0 Devices
Device-to-Device (D2D) communication enables devices in proximity to establish a wireless direct link. However, these devices may be severely constrained in terms of memory, CPU, and processing resources.
Juan Jose Echevarria +3 more
doaj +1 more source
Combining PTEN protein assessment and transcriptomic profiling of prostate tumors, we uncovered a network enriched in senescence and extracellular matrix (ECM) programs associated with PTEN loss and conserved in a mouse model. We show that PTEN‐deficient cells trigger paracrine remodeling of the surrounding stroma and this information could help ...
Ivana Rondon‐Lorefice +16 more
wiley +1 more source
Password Based a Generalize Robust Security System Design Using Neural Network [PDF]
Among the various means of available resource protection including biometrics, password based system is most simple, user friendly, cost effective and commonly used. But this method having high sensitivity with attacks.
Singh, Manoj Kumar
core +1 more source
Potential therapeutic targeting of BKCa channels in glioblastoma treatment
This review summarizes current insights into the role of BKCa and mitoBKCa channels in glioblastoma biology, their potential classification as oncochannels, and the emerging pharmacological strategies targeting these channels, emphasizing the translational challenges in developing BKCa‐directed therapies for glioblastoma treatment.
Kamila Maliszewska‐Olejniczak +4 more
wiley +1 more source
Plecstatin inhibits hepatocellular carcinoma tumorigenesis and invasion through cytolinker plectin
The ruthenium‐based metallodrug plecstatin exerts its anticancer effect in hepatocellular carcinoma (HCC) primarily through selective targeting of plectin. By disrupting plectin‐mediated cytoskeletal organization, plecstatin inhibits anchorage‐dependent growth, cell polarization, and tumor cell dissemination.
Zuzana Outla +10 more
wiley +1 more source
Research on Integrity Check Method of Cloud Storage Multi-Copy Data Based on Multi-Agent
Aimed at the huge number of files in cloud storage and the low audit efficiency of single-node audit mode, this paper proposes a multi-agent-based cloud storage multi-copy data integrity check scheme.
Chunbo Wang, Xiaoqiang Di
doaj +1 more source
Nanosecond infrared laser (NIRL) low‐volume sampling combined with shotgun lipidomics uncovers distinct lipidome alterations in oropharyngeal squamous cell carcinoma (OPSCC) of the palatine tonsil. Several lipid species consistently differentiate tumor from healthy tissue, highlighting their potential as diagnostic markers.
Leonard Kerkhoff +11 more
wiley +1 more source
A Hybrid Deep Learning System for Real-World Mobile User Authentication Using Motion Sensors
With the popularity of smartphones and the development of hardware, mobile devices are widely used by people. To ensure availability and security, how to protect private data in mobile devices without disturbing users has become a key issue.
Tiantian Zhu +3 more
doaj +1 more source
Application Of Esa In The Cave Mode Authentication
{"references": ["3GPP2 S.S0053, \"Common Cryptographic Algorithms\", 2002.", "3GPP2 S.S0055, \"Enhanced Cryptographic Algorithms\", 2005.", "3GPP2 S.S0078, \"Common Security Algorithms\", 2005.", "3GPP2 S.S0054, \"Interface Specification for Common Cryptographic\nAlgorithms\", 2002.", "3GPP2 S.R0032, \"ESA and ESP\", 2000.", "3GPP2 N.S0014 ...
Keonwoo Kim, Dowon Hong, Kyoil Chung
openaire +2 more sources
Etoposide induces DNA damage, activating p53‐dependent apoptosis via caspase‐3/7, which cleaves PARP1. Dammarenediol II enhances this apoptotic pathway by suppressing O‐GlcNAc transferase activity, further decreasing O‐GlcNAcylation. The reduction in O‐GlcNAc levels boosts p53‐driven apoptosis and influences the Akt/GSK3β/mTOR signaling pathway ...
Jaehoon Lee +8 more
wiley +1 more source

