Results 51 to 60 of about 80,415 (263)
Environmental Risk Discrimination and Assessment for Municipal Solid Waste Secure Landfill Site [PDF]
With the development of urbanization, the amount of municipal solid waste is increasing. Landfill is the main method for disposing the urban garbage at present in China.
Cao Yonghong
doaj +1 more source
Backdoors in Pseudorandom Number Generators:Possibility and Impossibility Results [PDF]
Inspired by the Dual EC DBRG incident, Dodis et al. (Eurocrypt 2015) initiated the formal study of backdoored PRGs, showing that backdoored PRGs are equivalent to public key encryption schemes, giving constructions for backdoored PRGs (BPRGs), and ...
Degabriele, Jean +3 more
core +2 more sources
Effective therapeutic targeting of CTNNB1‐mutant hepatoblastoma with WNTinib
WNTinib, a Wnt/CTNNB1 inhibitor, was tested in hepatoblastoma (HB) experimental models. It delayed tumor growth and improved survival in CTNNB1‐mutant in vivo models. In organoids, WNTinib outperformed cisplatin and showed enhanced efficacy in combination therapy, supporting its potential as a targeted treatment for CTNNB1‐mutated HB.
Ugne Balaseviciute +17 more
wiley +1 more source
Forward Secure Non-Interactive Key Exchange [PDF]
Exposure of secret keys is a major concern when cryptographic protocols are implemented on weakly secure devices. Forward security is thus a way to mitigate damages when such an event occurs. In a forward-secure scheme, the public key is indeed fixed while the secret key is updated with a one-way process at regular time periods so that security of the ...
Pointcheval, David, Sanders, Olivier
openaire +2 more sources
Efficient and Low-Cost RFID Authentication Schemes [PDF]
Security in passive resource-constrained Radio Frequency Identification (RFID) tags is of much interest nowadays. Resistance against illegal tracking, cloning, timing, and replay attacks are necessary for a secure RFID authentication scheme.
Miyaji, Atsuko +2 more
core +1 more source
Self-healing in unattended wireless sensor networks [PDF]
Wireless sensor networks (WSNs) appeal to a wide range of applications that involve the monitoring of various physical phenomena. However, WSNs are subject to many threats.
Di Pietro, Roberto +3 more
core +2 more sources
The LINC01116 long noncoding RNA is induced by hypoxia and associated with poor prognosis and high recurrence rates in two cohorts of lung adenocarcinoma patients. Here, we demonstrate that besides its expression in cancer cells, LINC01116 is markedly expressed in lymphatic endothelial cells of the tumor stroma in which it participates in hypoxia ...
Marine Gautier‐Isola +12 more
wiley +1 more source
The Internet of Things (IoT) and 5G networks play important roles in the latest systems for managing and monitoring various types of data. These 5G based IoT environments collect various data in real-time using micro-sensors as IoT things devices and ...
Kisung Park, Youngho Park
doaj +1 more source
A Practical Searchable Symmetric Encryption Scheme for Smart Grid Data
Outsourcing data storage to the remote cloud can be an economical solution to enhance data management in the smart grid ecosystem. To protect the privacy of data, the utility company may choose to encrypt the data before uploading them to the cloud ...
Li, Jiangnan +2 more
core +1 more source
Pharmacologic ascorbate (vitamin C) increases ROS, disrupts cellular metabolism, and induces DNA damage in CRPC cells. These effects sensitize tumors to PARP inhibition, producing synergistic growth suppression with olaparib in vitro and significantly delayed tumor progression in vivo. Pyruvate rescue confirms ROS‐dependent activity.
Nicolas Gordon +13 more
wiley +1 more source

