Results 21 to 30 of about 6,891 (225)

Implementation of Lashkari et al Scheme and Convergent Encryption on Cloud-Based Secure Deduplication Application

open access: yesIOP Conference Series: Materials Science and Engineering, 2020
Abstract The development and growth of data is rapidly increasing and it triggers development on storage technology namely cloud storage. In this research, implementation of Lashkari et al scheme and convergent encryption was conducted on cloud application to provide data confidentiality service and cloud storage space efficiency.
Hermawan Setiawan, Rico Setyawan
openaire   +1 more source

Optimum Watermark Detection and Embedding in Digital Images [PDF]

open access: yes, 1998
This work concentrates on the problem of watermarking of still images using the luminance component, through the use of spread spectrum techniques, both in space (direct sequence spread spectrum or DSSS) and frequency (frequency hopping or FH), following
Sayrol Clols, Elisa   +1 more
core   +1 more source

Spatiotemporal and quantitative analyses of phosphoinositides – fluorescent probe—and mass spectrometry‐based approaches

open access: yesFEBS Letters, EarlyView.
Fluorescent probes allow dynamic visualization of phosphoinositides in living cells (left), whereas mass spectrometry provides high‐sensitivity, isomer‐resolved quantitation (right). Their synergistic use captures complementary aspects of lipid signaling. This review illustrates how these approaches reveal the spatiotemporal regulation and quantitative
Hiroaki Kajiho   +3 more
wiley   +1 more source

A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing [PDF]

open access: yes, 2016
The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.The concept of cloud computing offers measurable computational or information resources as a service over ...
Kiraz, Mehmet Sabir
core   +1 more source

Organ‐specific redox imbalances in spinal muscular atrophy mice are partially rescued by SMN antisense oligonucleotides

open access: yesFEBS Letters, EarlyView.
We identified a systemic, progressive loss of protein S‐glutathionylation—detected by nonreducing western blotting—alongside dysregulation of glutathione‐cycle enzymes in both neuronal and peripheral tissues of Taiwanese SMA mice. These alterations were partially rescued by SMN antisense oligonucleotide therapy, revealing persistent redox imbalance as ...
Sofia Vrettou, Brunhilde Wirth
wiley   +1 more source

Potential therapeutic targeting of BKCa channels in glioblastoma treatment

open access: yesMolecular Oncology, EarlyView.
This review summarizes current insights into the role of BKCa and mitoBKCa channels in glioblastoma biology, their potential classification as oncochannels, and the emerging pharmacological strategies targeting these channels, emphasizing the translational challenges in developing BKCa‐directed therapies for glioblastoma treatment.
Kamila Maliszewska‐Olejniczak   +4 more
wiley   +1 more source

Implementation of Deduplication on Encrypted Big-data using Signcryption for cloud storage applications [PDF]

open access: yes, 2018
As Big Data Cloud storage servers are getting widespread the shortage of disc space within the cloud becomes a major concern. The elimination of duplicate or redundant data, particularly in computer data is named deduplication.
Archana, A   +2 more
core  

Plecstatin inhibits hepatocellular carcinoma tumorigenesis and invasion through cytolinker plectin

open access: yesMolecular Oncology, EarlyView.
The ruthenium‐based metallodrug plecstatin exerts its anticancer effect in hepatocellular carcinoma (HCC) primarily through selective targeting of plectin. By disrupting plectin‐mediated cytoskeletal organization, plecstatin inhibits anchorage‐dependent growth, cell polarization, and tumor cell dissemination.
Zuzana Outla   +10 more
wiley   +1 more source

A Survey on Data Redundancy Check in a Hybrid Cloud by using Convergent Encryption

open access: yesIndian Journal of Science and Technology, 2016
Background/Objectives: Data deduplication is the elimination of redundant data within an existing environment. It is mainly used in cloud storage environment for bandwidth optimization and to enhance storage space. This paper focuses on different dedupe techniques with a secure cloud. Methods/Statistical Analysis: Symmetric key encryption is used to
N. R. Anitha Rani   +2 more
openaire   +1 more source

Peroxidasin enables melanoma immune escape by inhibiting natural killer cell cytotoxicity

open access: yesMolecular Oncology, EarlyView.
Peroxidasin (PXDN) is secreted by melanoma cells and binds the NK cell receptor NKG2D, thereby suppressing NK cell activation and cytotoxicity. PXDN depletion restores NKG2D signaling and enables effective NK cell–mediated melanoma killing. These findings identify PXDN as a previously unrecognized immune evasion factor and a potential target to improve
Hsu‐Min Sung   +17 more
wiley   +1 more source

Home - About - Disclaimer - Privacy