Results 51 to 60 of about 441,462 (365)

FoxO1 signaling in B cell malignancies and its therapeutic targeting

open access: yesFEBS Letters, EarlyView.
FoxO1 has context‐specific tumor suppressor or oncogenic character in myeloid and B cell malignancies. This includes tumor‐promoting properties such as stemness maintenance and DNA damage tolerance in acute leukemias, or regulation of cell proliferation and survival, or migration in mature B cell malignancies.
Krystof Hlavac   +3 more
wiley   +1 more source

Secure and Authenticated Data Communication in Wireless Sensor Networks

open access: yesSensors, 2015
Securing communications in wireless sensor networks is increasingly important as the diversity of applications increases. However, even today, it is equally important for the measures employed to be energy efficient.
Omar Alfandi   +4 more
doaj   +1 more source

Homomorphic Encryption of Supervisory Control Systems Using Automata

open access: yesIEEE Access, 2020
Cyber-physical systems have been highly integrated into many contemporary infrastructures. As this integration deepens, the importance of protecting these systems from unauthorized access and data corruption increases.
Sian Zhou   +5 more
doaj   +1 more source

Lightweight Encryption Technique to Enhance Medical Image Security on Internet of Medical Things Applications

open access: yesIEEE Access, 2021
The importance of image security in the field of medical imaging is challenging. Several research works have been conducted to secure medical healthcare images. Encryption, not risking loss of data, is the right solution for image confidentiality. Due to
M. Hasan   +10 more
semanticscholar   +1 more source

Insights into PI3K/AKT signaling in B cell development and chronic lymphocytic leukemia

open access: yesFEBS Letters, EarlyView.
This Review explores how the phosphoinositide 3‐kinase and protein kinase B pathway shapes B cell development and drives chronic lymphocytic leukemia, a common blood cancer. It examines how signaling levels affect disease progression, addresses treatment challenges, and introduces novel experimental strategies to improve therapies and patient outcomes.
Maike Buchner
wiley   +1 more source

Time based incremental backup scheme for mobile cloud computing

open access: yes网络与信息安全学报, 2016
A time-based data secure backup mechanism for moving the cloud was presented.Time was considered as a parameter into the data encryption for the important information in mobile device and backups the users' data ac-cording to the time period.It had not ...
Yun-fei CI,Guo-zhen SHI,Rong-na XIE,Yao-ming PAN,Feng YANG   +1 more
doaj   +1 more source

Persistent issues in encryption software: A heuristic and cognitive walkthrough [PDF]

open access: yes, 2014
The support information accompanying security software can be difficult to understand by end-users, who have little knowledge in cyber security.
El-Abed, Jad, Szewczyk, Patryk S
core   +1 more source

Processing Encrypted Data Using Homomorphic Encryption

open access: yes, 2017
Fully Homomorphic Encryption (FHE) was initially introduced as a concept shortly after the development of the RSA cryptosystem, by Rivest et al. [54]. Although long sought after, the first functional scheme was only proposed over thirty years later by Gentry [34, 35] in 2009. The same blueprint to construct FHE has been followed in all subsequent work.
Barnett, Anthony   +14 more
openaire   +3 more sources

Making tau amyloid models in vitro: a crucial and underestimated challenge

open access: yesFEBS Letters, EarlyView.
This review highlights the challenges of producing in vitro amyloid assemblies of the tau protein. We review how accurately the existing protocols mimic tau deposits found in the brain of patients affected with tauopathies. We discuss the important properties that should be considered when forming amyloids and the benchmarks that should be used to ...
Julien Broc, Clara Piersson, Yann Fichou
wiley   +1 more source

Block encryption of quantum messages [PDF]

open access: yes, 2018
In modern cryptography, block encryption is a fundamental cryptographic primitive. However, it is impossible for block encryption to achieve the same security as one-time pad.
Liang, Min, Yang, Li
core   +1 more source

Home - About - Disclaimer - Privacy