Results 61 to 70 of about 81,733 (278)
Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency [PDF]
Recently, several practical attacks raised serious concerns over the security of searchable encryption. The attacks have brought emphasis on forward privacy, which is the key concept behind solutions to the adaptive leakage-exploiting attacks, and will ...
Dong, Changyu +4 more
core +1 more source
Reconfigurable Security: Edge Computing-based Framework for IoT
In various scenarios, achieving security between IoT devices is challenging since the devices may have different dedicated communication standards, resource constraints as well as various applications.
Chen, Jyh-Cheng +3 more
core +1 more source
RIPK4 function interferes with melanoma cell adhesion and metastasis
RIPK4 promotes melanoma growth and spread. RIPK4 levels increase as skin lesions progress to melanoma. CRISPR/Cas9‐mediated deletion of RIPK4 causes melanoma cells to form less compact spheroids, reduces their migratory and invasive abilities and limits tumour growth and dissemination in mouse models.
Norbert Wronski +9 more
wiley +1 more source
Analysis and improvement of an ID-based authenticated key agreement protocol
The security of a recently proposed ID-based authenticated key agreement protocol was analyzed. Although it is provably secure in the standard model, a malicious PKG (private key generator) can still obtain all of the agreed ses-sion keys, that is, it ...
WANG Xiao-fen1 +2 more
doaj +2 more sources
We have established a humanized orthotopic patient‐derived xenograft (Hu‐oPDX) mouse model of high‐grade serous ovarian cancer (HGSOC) that recapitulates human tumor–immune interactions. Using combined anti‐PD‐L1/anti‐CD73 immunotherapy, we demonstrate the model's improved biological relevance and enhanced translational value for preclinical ...
Luka Tandaric +10 more
wiley +1 more source
Secure and Reliable IPTV Multimedia Transmission Using Forward Error Correction
With the wide deployment of Internet Protocol (IP) infrastructure and rapid development of digital technologies, Internet Protocol Television (IPTV) has emerged as one of the major multimedia access techniques.
Chi-Huang Shih +2 more
doaj +1 more source
Efficient and Low-Cost RFID Authentication Schemes [PDF]
Security in passive resource-constrained Radio Frequency Identification (RFID) tags is of much interest nowadays. Resistance against illegal tracking, cloning, timing, and replay attacks are necessary for a secure RFID authentication scheme.
Miyaji, Atsuko +2 more
core +1 more source
Relay-Aided Secure Broadcasting for Visible Light Communications
A visible light communication broadcast channel is considered, in which a transmitter luminaire communicates with two legitimate receivers in the presence of an external eavesdropper.
Arafa, Ahmed +2 more
core +1 more source
Beyond its role in immune evasion, this study identified that CD47 drives tumor‐intrinsic signaling in non‐small cell lung cancer (NSCLC). Transcriptomic profiling and functional studies revealed that CD47 regulates cell adhesion, migration, and metastasis through an ERK–EMT signaling axis.
Asa P.Y. Lau +8 more
wiley +1 more source
Forward-Secure Group Signatures from Lattices [PDF]
Group signature is a fundamental cryptographic primitive, aiming to protect anonymity and ensure accountability of users. It allows group members to anonymously sign messages on behalf of the whole group, while incorporating a tracing mechanism to identify the signer of any suspected signature.
Ling, San +3 more
openaire +2 more sources

