Results 61 to 70 of about 26,049,904 (376)
Urinary LGALS3BP is elevated in bladder cancer patients compared to healthy controls as detected by the 1959 antibody–based ELISA. The antibody shows enhanced reactivity to the high‐mannose glycosylated variant secreted by cancer cells treated with kifunensine (KIF).
Asia Pece +18 more
wiley +1 more source
Secure Data of Industrial Internet of Things in a Cement Factory Based on a Blockchain Technology
The Industrial Internet of Things (IIoT) has become a pivotal field of development that can increase the efficiency of real-time collection, recording, analysis, and control of the entire activities of various machines, and can actively enhance quality ...
Samir M. Umran +4 more
doaj +1 more source
Progger: an efficient, tamper-evident kernel-space logger for cloud data provenance tracking [PDF]
Cloud data provenance, or "what has happened to my data in the cloud", is a critical data security component which addresses pressing data accountability and data governance issues in cloud computing systems. In this paper, we present Progger (Provenance
Ko, Ryan K.L., Will, Mark Antony
core +2 more sources
Generation of two normal and tumour (cancerous) paired human cell lines using an established tissue culture technique and their characterisation is described. Cell lines were characterised at cellular, protein, chromosome and gene expression levels and for HPV status.
Simon Broad +12 more
wiley +1 more source
Homomorphic encryption location privacy-preserving scheme based on Markov model
Homomorphic encryption location privacy-preserving scheme based on Markov mode was proposed to solve the problem of location privacy and query privacy protection in location-based service systems.
Kai ZHOU,Jian-qiong HE +2 more
doaj +1 more source
Liquid biopsy enables minimally invasive, real‐time molecular profiling through analysis of circulating biomarkers in biological fluids. This Perspective highlights the importance of training pathologists through integrative educational programs, such as the European Masters in Molecular Pathology, to ensure effective and equitable implementation of ...
Marius Ilié +13 more
wiley +1 more source
FL-GUARD: A Holistic Framework for Run-Time Detection and Recovery of Negative Federated Learning
Federated learning (FL) is a promising approach for learning a model from data distributed on massive clients without exposing data privacy. It works effectively in the ideal federation where clients share homogeneous data distribution and learning ...
Hong Lin +4 more
doaj +1 more source
Analysis and Improvement of Entropy Estimators in NIST SP 800-90B for Non-IID Entropy Sources
Random number generators (RNGs) are essential for cryptographic applications. In most practical applications, the randomness of RNGs is provided by entropy sources.
Shuangyi Zhu +4 more
doaj +1 more source
Data Security, Customer Trust and Intention for Adoption of Fintech Services: An Empirical Analysis From Commercial Bank Users in Pakistan [PDF]
Zhang Wenxiang +5 more
openalex +1 more source
Designing privacy for scalable electronic healthcare linkage [PDF]
A unified electronic health record (EHR) has potentially immeasurable benefits to society, and the current healthcare industry drive to create a single EHR reflects this.
Ajayi, O. +3 more
core +2 more sources

