Results 61 to 70 of about 2,279,222 (327)
Bone metastasis in prostate cancer (PCa) patients is a clinical hurdle due to the poor understanding of the supportive bone microenvironment. Here, we identify stearoyl‐CoA desaturase (SCD) as a tumor‐promoting enzyme and potential therapeutic target in bone metastatic PCa.
Alexis Wilson +7 more
wiley +1 more source
Low-cost group-based identity security authentication protocol for NB-IoT nodes
To address the problem of huge number of signaling requests when large-scale devices request authentication in NB-IoT network, a low-cost group identity security authentication protocol based on Schnorr aggregate signature and Chinese reminder theorem ...
Xiangmao CHANG, Jun ZHAN, Zhiwei WANG
doaj +2 more sources
The review of Extensible Authentication Protocol and its methods
Authentication is associated with a scenario, in which some party (the applicant) presented the identity of the principal and states that this is the principal.
A. V. Nikeshin, V. Z. Shnitman
doaj +1 more source
We identified a systemic, progressive loss of protein S‐glutathionylation—detected by nonreducing western blotting—alongside dysregulation of glutathione‐cycle enzymes in both neuronal and peripheral tissues of Taiwanese SMA mice. These alterations were partially rescued by SMN antisense oligonucleotide therapy, revealing persistent redox imbalance as ...
Sofia Vrettou, Brunhilde Wirth
wiley +1 more source
Mobile transactions over NFC and GSM [PDF]
Dynamic relationships between Near Field Communication (NFC) ecosystem players in a monetary transaction make them partners in a way that they sometimes require to share access permission to applications that are running in the service environment.
Ghinea, G +3 more
core
CALIPER: Continuous Authentication Layered with Integrated PKI Encoding Recognition
Architectures relying on continuous authentication require a secure way to challenge the user's identity without trusting that the Continuous Authentication Subsystem (CAS) has not been compromised, i.e., that the response to the layer which manages ...
Boult, Terrance E., Rudd, Ethan M.
core +1 more source
General MIM Secure Two-round Authentication Protocol Based on LPN [PDF]
The LPN-based authentication protocol is simple in structure,low in computation,and resistant to quantum attacks.It is suitable for lightweight devices such as radio frequency identification,but it cannot meet the requirements of low cost and strong ...
QING Zhejia
doaj +1 more source
RFID mutual authentication protocols
As RFID-tagged systems become ubiquitous, the acceptance of this technology by the general public necessitates addressing related security/privacy issues. The past six years have seen an increasing number of publications in this direction, specifically using cryptographic approaches. We consider a stream of publications among these that consider mutual
RFID European Lab, Paris, France ( host institution ) +1 more
openaire +2 more sources
Tau acetylation at K331 has limited impact on tau pathology in vivo
We mapped tau post‐translational modifications in humanized MAPT knock‐in mice and in amyloid‐bearing double knock‐in mice. Acetylation within the repeat domain, particularly around K331, showed modest increases under amyloid pathology. To test functional relevance, we generated MAPTK331Q knock‐in mice.
Shoko Hashimoto +3 more
wiley +1 more source
Verifying authentication protocols with CSP
The paper presents a general approach for analysis and verification of authentication properties in the language of communicating sequential processes (CSP). It is illustrated by an examination of the Needham-Schroeder public key protocol (R. Needham and M. Schroeder, 1978). The contribution of the article is to develop a specific theory appropriate to
openaire +3 more sources

