Results 81 to 90 of about 80,415 (263)
Relay-Aided Secure Broadcasting for Visible Light Communications
A visible light communication broadcast channel is considered, in which a transmitter luminaire communicates with two legitimate receivers in the presence of an external eavesdropper.
Arafa, Ahmed +2 more
core +1 more source
KLK7, a tissue kallikrein‐related peptidase, is elevated in advanced colorectal cancer and associated with shorter survival. High KLK7 levels in ascites correlate with peritoneal metastasis. In mice, KLK7 overexpression increases metastasis. In vitro, KLK7 enhances cancer cell proliferation, migration, adhesion, and spheroid formation, driving ...
Yosr Z. Haffani +6 more
wiley +1 more source
FROG: Forward-Secure Post-Quantum Signature
Forward-secure signatures guarantee that the signatures generated before the compromise of private key remain secure, and therefore offer an enhanced compromise-resiliency for real-life applications such as digital forensics, audit logs, and financial systems. However, the vast majority of state-of-the-art forward-secure signatures rely on conventional
Yavuz, Attila A., Behnia, Rouzbeh
openaire +2 more sources
The role of lipid metabolism in neuronal senescence
Disrupted lipid metabolism, through alterations in lipid species or lipid droplet accumulation, can drive neuronal senescence. However, lipid dyshomeostasis can also occur alongside neuronal senescence, further amplifying tissue damage. Delineating how lipid‐induced senescence emerges in neurons and glial cells, and how it contributes to ageing and ...
Dikaia Tsagkari +2 more
wiley +1 more source
Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency [PDF]
Recently, several practical attacks raised serious concerns over the security of searchable encryption. The attacks have brought emphasis on forward privacy, which is the key concept behind solutions to the adaptive leakage-exploiting attacks, and will ...
Dong, Changyu +4 more
core +1 more source
Formal Computational Unlinkability Proofs of RFID Protocols
We set up a framework for the formal proofs of RFID protocols in the computational model. We rely on the so-called computationally complete symbolic attacker model. Our contributions are: i) To design (and prove sound) axioms reflecting the properties of
Comon, Hubert, Koutsos, Adrien
core +1 more source
Mouse pre‐implantation development involves a transition from totipotency to pluripotency. Integrating transcriptomics, epigenetic profiling, low‐input proteomics and functional assays, we show that eight‐cell embryos retain residual totipotency features, whereas cytoskeletal remodeling regulated by the ubiquitin‐proteasome system drives progression ...
Wanqiong Li +8 more
wiley +1 more source
Secure Connectivity Probability of Multi‐hop Clustered Randomize‐and‐Forward Networks
This work investigates secure cluster‐aided multi‐hop randomize‐and‐forward networks. We present a hop‐by‐hop multi‐hop transmission scheme with relay selection, which evaluates for each cluster the relays that can securely receive the message.
Xiaowei Wang, Zhou Su, Guangyi Wang
doaj +1 more source
Secure Transmission in SWIPT-Powered Two-Way Untrusted Relay Networks
In this paper, we investigate the secure transmission in two-way untrusted amplify-and-forward relay networks with simultaneous wireless information and power transfer (SWIPT).
Jiazhen Zhang +3 more
doaj +1 more source
HIV‐1 establishes immediate latency in T cells expressing the viral Nef protein
Nef is a viral protein often omitted from HIV‐1 reporter viruses. Consequently, its role in viral latency is unclear. We developed three novel dual reporter HIV‐1 derivatives that express Nef and allow for detection of latent and productive infection. Using these reporters, we show that Nef does not affect the establishment of immediate viral latency ...
Cindy Lam, Ivan Sadowski
wiley +1 more source

