Results 21 to 30 of about 43,933 (259)
An anonymous batch handover authentication protocol for big flow wireless mesh networks
Wireless mesh network (WMN), as a new generation of wireless network technology, has raised increasing concerns in recent years. Due to the strong mobility nature of the clients in WMNs, the handover events frequently occur.
Dongcheng Wang +3 more
doaj +1 more source
Development of therapies targeting cancer‐associated fibroblasts (CAFs) necessitates preclinical model systems that faithfully represent CAF–tumor biology. We established an in vitro coculture system of patient‐derived pancreatic CAFs and tumor cell lines and demonstrated its recapitulation of primary CAF–tumor biology with single‐cell transcriptomics ...
Elysia Saputra +10 more
wiley +1 more source
A Security Remote Command Control Scheme for Industrial Internet of Things [PDF]
With the increasing demand for intelligence in the industrial field, the Industrial Internet of Things(IIoT) has developed rapidly. IIoT can effectively improve process efficiency and decision quality in industrial production and has broad application ...
Jicheng CHEN, Zijian BAO, Min LUO, Debiao HE
doaj +1 more source
Identification of Bad Signatures in Batches [PDF]
The paper addresses the problem of bad signature identification in batch verification of digital signatures. The number of generic tests necessary to identify all bad signatures in a batch instance, is used to measure the efficiency of verifiers. The divide-and-conquer verifier DCV α (x,n) is defined.
Jaroslaw Pastuszak +3 more
openaire +1 more source
We developed and validated a DNA methylation–based biomarker panel to distinguish pleural mesothelioma from other pleural conditions. Using the IMPRESS technology, we translated this panel into a clinically applicable assay. The resulting two classifier models demonstrated excellent performance, achieving high AUC values and strong diagnostic accuracy.
Janah Vandenhoeck +12 more
wiley +1 more source
Improved blockchain-based ECDSA batch verification scheme
IntroductionBlockchain technology has attracted much attention due to its decentralization, transparency and security. Initially applied in the financial field, it has now expanded to various fields such as Internet of Things (IoT), electronic cash and ...
Guangfu Wu, Jiandong Zhou, Xiaoyan Fu
doaj +1 more source
Next‐generation proteomics improves lung cancer risk prediction
This is one of very few studies that used prediagnostic blood samples from participants of two large population‐based cohorts. We identified, evaluated, and validated an innovative protein marker model that outperformed an established risk prediction model and criteria employed by low‐dose computed tomography in lung cancer screening trials.
Megha Bhardwaj +4 more
wiley +1 more source
Data fusion protocol with source security for sensor networks
For the source security need,a digital signature scheme with aggregate signatures,data fusion and batch verification was proposed.Based on the proposed signature scheme and the homomorphic encryption technology,a data fusion protocol with secure sources ...
ZHANG Peng, YU Jian-ping, LIU Hong-wei
doaj +2 more sources
Resistance to platinum and taxane adjuvant chemotherapy (ACT) is the main cause of the recurrence and poor prognosis of high-grade serous ovarian cancer (HGS-OvCa) patients receiving platinum-taxane ACT after surgery.
Yixin Liu +11 more
doaj +1 more source
Plecstatin inhibits hepatocellular carcinoma tumorigenesis and invasion through cytolinker plectin
The ruthenium‐based metallodrug plecstatin exerts its anticancer effect in hepatocellular carcinoma (HCC) primarily through selective targeting of plectin. By disrupting plectin‐mediated cytoskeletal organization, plecstatin inhibits anchorage‐dependent growth, cell polarization, and tumor cell dissemination.
Zuzana Outla +10 more
wiley +1 more source

