Results 51 to 60 of about 313,696 (165)
CD74highCD7high exhausted CD8+T cells were characterized by ScRNA‐seq, and their association with SLE diagnostic indicators was evaluated. NSUN4 was screened as a therapeutic target by integrative analysis of scRNA‐seq and m5C‐seq, and its role in mitochondrial dysfunction was investigated in cultured CD8+T cells in vitro. The therapeutic effect of LPH‐
Bincheng Ren +9 more
wiley +1 more source
Wireless Medical Sensor Networks: Design Requirements and Enabling Technologies [PDF]
This article analyzes wireless communication protocols that could be used in healthcare environments (e.g., hospitals and small clinics) to transfer real-time medical information obtained from noninvasive sensors.
Abatti, Paulo J. +3 more
core +1 more source
This paper studies the concrete security of PRFs and MACs obtained by keying hash functions based on the sponge paradigm. One such hash function is KECCAK, selected as NIST’s new SHA-3 standard.
E Petrank +25 more
core +2 more sources
Высокоскоростной UMAC алгоритм [PDF]
Розглядається високошвидкістний UMAC алгоритм, характеристики, параметри та оцінка таємності.The high-speed UMAC algorithm, characteristics, parameters and an estimation of privacy are ...
Халимов, Геннадий
core
Trusted Cameras on Mobile Devices Based on SRAM Physically Unclonable Functions [PDF]
Nowadays, there is an increasing number of cameras placed on mobile devices connected to the Internet. Since these cameras acquire and process sensitive and vulnerable data in applications such as surveillance or monitoring, security is essential to ...
Arcenegui, Javier +3 more
core +1 more source
Cancer stem cells, characterized by self‐renewal, differentiation, heterogeneity, plasticity and tumorigenicity, are regulated by intrinsic factors such as signaling pathways, transcription factors, metabolism and noncoding RNAs, as well as environmental cells (including tumor cells, immune cells and stromal cells), environmental factors and distant ...
Zhenzhen Chen +11 more
wiley +1 more source
Análisis de la gestión de seguridad de los protocolos WPA y WPA2 en el tráfico de datos de una red LAN con tecnología WiFi [PDF]
Este documento pretende explicar paso a paso el sistema utilizado por los protocolos de seguridad de acceso e intercambio de datos WPA Y WPA2 utilizados por el sistema de comunicaciones WiFi.
Fonseca Sánchez, Víctor Hugo +1 more
core
ЗАЩИТА ДОМАШНЕЙ WI-FI СЕТИ ОТ ВЗЛОМА [PDF]
Беспроводные сети не являются защищенными.
Манко, Е.М. +1 more
core
Wireless Voting System Based on IEEE 802.15.4/Zigbee [PDF]
Práce podrobně popisuje bezdrátový protokol IEEE 802.15.4/ZigBee a zabývá se návrhem architektury bezdrátového hlasovacího systému založené na zmíněné technologii.
Albrecht, Pavel
core
Trusted Computing using Enhanced Manycore Architectures with Cryptoprocessors
International audienceManycore architectures correspond to a main evolution of computing systems due to their high processing power. Many applications can be executed in parallel which provides users with a very efficient technology.
Baganne, A +5 more
core +1 more source

