Results 51 to 60 of about 672,157 (285)
A Cloud-based RFID Authentication Protocol with Insecure Communication Channels [PDF]
© 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new ...
Alshehri, Awatif +2 more
core +2 more sources
Effective therapeutic targeting of CTNNB1‐mutant hepatoblastoma with WNTinib
WNTinib, a Wnt/CTNNB1 inhibitor, was tested in hepatoblastoma (HB) experimental models. It delayed tumor growth and improved survival in CTNNB1‐mutant in vivo models. In organoids, WNTinib outperformed cisplatin and showed enhanced efficacy in combination therapy, supporting its potential as a targeted treatment for CTNNB1‐mutated HB.
Ugne Balaseviciute +17 more
wiley +1 more source
KLK7, a tissue kallikrein‐related peptidase, is elevated in advanced colorectal cancer and associated with shorter survival. High KLK7 levels in ascites correlate with peritoneal metastasis. In mice, KLK7 overexpression increases metastasis. In vitro, KLK7 enhances cancer cell proliferation, migration, adhesion, and spheroid formation, driving ...
Yosr Z. Haffani +6 more
wiley +1 more source
DP-MCDBSCAN: Differential Privacy Preserving Multi-Core DBSCAN Clustering for Network User Data
The proliferation of ubiquitous Internet and mobile devices has brought about the exponential growth of individual data in big data era. The network user data has been confronted with serious privacy concerns for extracting valuable information during ...
Lina Ni +4 more
doaj +1 more source
Looking Back to Move Forward: A Bibliometric Analysis of Consumer Privacy Research
Information privacy has attracted considerable attention in the information system research field. However, little effort has been made to review its latest developments from a marketing perspective.
Sheng Shu, Yi Liu
doaj +1 more source
Cryptanalysis of Sun and Cao's Remote Authentication Scheme with User Anonymity [PDF]
Dynamic ID-based remote user authentication schemes ensure efficient and anonymous mutual authentication between entities. In 2013, Khan et al. proposed an improved dynamic ID-based authentication scheme to overcome the security flaws of Wang et al.'s ...
Mishra, Dheerendra
core
ABSTRACT Objective Status epilepticus (SE) is associated with significant mortality. Sleep architecture may reflect normal brain function. Impaired sleep architecture is associated with poorer outcomes in numerous conditions. Here we investigate the association of sleep architecture in continuous EEG (cEEG) with survival in SE.
Ran R. Liu +5 more
wiley +1 more source
Privacy preserving based on differential privacy for weighted social networks
Focusing on the weak protection problems in privacy preservation of weighted social networks publication,a privacy preserving method based on differential privacy was put forward for strong protection of edges and edge weights.The WSQuery query model was
Li-hui LAN, Shi-guang JU
doaj +2 more sources
Five‐Year Disease Progression in Synuclein Seeding Positive Sporadic Parkinson's Disease
ABSTRACT Objective To provide a comprehensive description of disease progression in synuclein seeding assay (SAA) positive sporadic Parkinson Disease participants, using Neuronal Synuclein Disease integrated biological and functional impairment staging framework.
Paulina Gonzalez‐Latapi +19 more
wiley +1 more source
Response to Privacy as a Public Good [PDF]
In the spirit of moving forward the theoretical and empirical scholarship on privacy as a public good, this response addresses four issues raised by Professors Fairfield and Engel’s article: first, their depiction of individuals in groups; second ...
Regan, Priscilla M.
core +1 more source

