Results 61 to 70 of about 2,279,222 (327)

Inhibiting stearoyl‐CoA desaturase suppresses bone metastatic prostate cancer by modulating cellular stress, mTOR signaling, and DNA damage response

open access: yesFEBS Letters, EarlyView.
Bone metastasis in prostate cancer (PCa) patients is a clinical hurdle due to the poor understanding of the supportive bone microenvironment. Here, we identify stearoyl‐CoA desaturase (SCD) as a tumor‐promoting enzyme and potential therapeutic target in bone metastatic PCa.
Alexis Wilson   +7 more
wiley   +1 more source

Low-cost group-based identity security authentication protocol for NB-IoT nodes

open access: yesTongxin xuebao, 2021
To address the problem of huge number of signaling requests when large-scale devices request authentication in NB-IoT network, a low-cost group identity security authentication protocol based on Schnorr aggregate signature and Chinese reminder theorem ...
Xiangmao CHANG, Jun ZHAN, Zhiwei WANG
doaj   +2 more sources

The review of Extensible Authentication Protocol and its methods

open access: yesТруды Института системного программирования РАН, 2018
Authentication is associated with a scenario, in which some party (the applicant) presented the identity of the principal and states that this is the principal.
A. V. Nikeshin, V. Z. Shnitman
doaj   +1 more source

Organ‐specific redox imbalances in spinal muscular atrophy mice are partially rescued by SMN antisense oligonucleotides

open access: yesFEBS Letters, EarlyView.
We identified a systemic, progressive loss of protein S‐glutathionylation—detected by nonreducing western blotting—alongside dysregulation of glutathione‐cycle enzymes in both neuronal and peripheral tissues of Taiwanese SMA mice. These alterations were partially rescued by SMN antisense oligonucleotide therapy, revealing persistent redox imbalance as ...
Sofia Vrettou, Brunhilde Wirth
wiley   +1 more source

Mobile transactions over NFC and GSM [PDF]

open access: yes, 2014
Dynamic relationships between Near Field Communication (NFC) ecosystem players in a monetary transaction make them partners in a way that they sometimes require to share access permission to applications that are running in the service environment.
Ghinea, G   +3 more
core  

CALIPER: Continuous Authentication Layered with Integrated PKI Encoding Recognition

open access: yes, 2016
Architectures relying on continuous authentication require a secure way to challenge the user's identity without trusting that the Continuous Authentication Subsystem (CAS) has not been compromised, i.e., that the response to the layer which manages ...
Boult, Terrance E., Rudd, Ethan M.
core   +1 more source

General MIM Secure Two-round Authentication Protocol Based on LPN [PDF]

open access: yesJisuanji gongcheng, 2019
The LPN-based authentication protocol is simple in structure,low in computation,and resistant to quantum attacks.It is suitable for lightweight devices such as radio frequency identification,but it cannot meet the requirements of low cost and strong ...
QING Zhejia
doaj   +1 more source

RFID mutual authentication protocols

open access: yesDecision Support Systems, 2011
As RFID-tagged systems become ubiquitous, the acceptance of this technology by the general public necessitates addressing related security/privacy issues. The past six years have seen an increasing number of publications in this direction, specifically using cryptographic approaches. We consider a stream of publications among these that consider mutual
RFID European Lab, Paris, France ( host institution )   +1 more
openaire   +2 more sources

Tau acetylation at K331 has limited impact on tau pathology in vivo

open access: yesFEBS Letters, EarlyView.
We mapped tau post‐translational modifications in humanized MAPT knock‐in mice and in amyloid‐bearing double knock‐in mice. Acetylation within the repeat domain, particularly around K331, showed modest increases under amyloid pathology. To test functional relevance, we generated MAPTK331Q knock‐in mice.
Shoko Hashimoto   +3 more
wiley   +1 more source

Verifying authentication protocols with CSP

open access: yesProceedings 10th Computer Security Foundations Workshop, 2002
The paper presents a general approach for analysis and verification of authentication properties in the language of communicating sequential processes (CSP). It is illustrated by an examination of the Needham-Schroeder public key protocol (R. Needham and M. Schroeder, 1978). The contribution of the article is to develop a specific theory appropriate to
openaire   +3 more sources

Home - About - Disclaimer - Privacy