Results 71 to 80 of about 88,610 (249)
EAEBHCM:an extended attribute encryption based hidden credentials model
The identity-based encryption based hidden credentials has three problems that it can not supports 1-N communication,endures no identity fuzzy and lefts open to conspiracy crack.An extended attribute encryption based hidden credentials model(EAEBHCM) was
Wei-jin GE, Xiao-hui HU
doaj
Victims and witnesses of cybercrime often hesitate to report incidents due to concerns over privacy, complexity, and fear of retaliation. Traditional reporting mechanisms require manual data entry, creating accessibility barriers and delaying response ...
Amir Aboubakr Shaker Mahmoud +2 more
doaj +1 more source
PICALM::MLLT10 translocated leukemia
This comprehensive review of PICALM::MLLT10 translocated acute leukemia provides an in‐depth review of the structure and function of CALM, AF10, and the fusion oncoprotein (1). The multifaceted molecular mechanisms of oncogenesis, including nucleocytoplasmic shuttling (2), epigenetic modifications (3), and disruption of endocytosis (4), are then ...
John M. Cullen +7 more
wiley +1 more source
Implementation of shared file encrypted storage hierarchical access control scheme
The traditional file sharing way is single,lack of security,and the shared file's permission autonomous control is too high.To solve these problems,a file encrypted storage and hierarchical access control scheme was proposed.Through increasing ...
Li LI +3 more
doaj
This study explores salivary RNA for breast cancer (BC) diagnosis, prognosis, and follow‐up. High‐throughput RNA sequencing identified distinct salivary RNA signatures, including novel transcripts, that differentiate BC from healthy controls, characterize histological and molecular subtypes, and indicate lymph node involvement.
Nicholas Rajan +9 more
wiley +1 more source
Time based incremental backup scheme for mobile cloud computing
A time-based data secure backup mechanism for moving the cloud was presented.Time was considered as a parameter into the data encryption for the important information in mobile device and backups the users' data ac-cording to the time period.It had not ...
Yun-fei CI +5 more
doaj
What Else is Revealed by Order-Revealing Encryption? [PDF]
F. Betül Durak +2 more
openalex +1 more source
A‐to‐I editing of miRNAs, particularly miR‐200b‐3p, contributes to HGSOC progression by enhancing cancer cell proliferation, migration and 3D growth. The edited form is linked to poorer patient survival and the identification of novel molecular targets.
Magdalena Niemira +14 more
wiley +1 more source
YAP1::TFE3 mediates endothelial‐to‐mesenchymal plasticity in epithelioid hemangioendothelioma
The YAP1::TFE3 fusion protein drives endothelial‐to‐mesenchymal transition (EndMT) plasticity, resulting in the loss of endothelial characteristics and gain of mesenchymal‐like properties, including resistance to anoikis, increased migratory capacity, and loss of contact growth inhibition in endothelial cells.
Ant Murphy +9 more
wiley +1 more source
Adaptaquin selectively kills glioma stem cells while sparing differentiated brain cells. Transcriptomic and proteomic analyses show Adaptaquin disrupts iron and cholesterol homeostasis, with iron chelation amplifying cytotoxicity via cholesterol depletion, mitochondrial dysfunction, and elevated reactive oxygen species.
Adrien M. Vaquié +16 more
wiley +1 more source

