Results 51 to 60 of about 1,094,705 (275)

On the Security of a Lightweight and Secure Access Authentication Scheme for Both UE and mMTC Devices in 5G Networks

open access: yesApplied Sciences, 2022
The Internet of Things (IoT) and 5G networks play important roles in the latest systems for managing and monitoring various types of data. These 5G based IoT environments collect various data in real-time using micro-sensors as IoT things devices and ...
Kisung Park, Youngho Park
doaj   +1 more source

A Forward-Secure Public-Key Encryption Scheme* [PDF]

open access: yesSSRN Electronic Journal, 2003
Cryptographic computations are often carried out on insecure devices for which the threat of key exposure represents a serious concern. Forward security allows one to mitigate the damage caused by exposure of secret keys. In a forward-secure scheme, secret keys are updated at regular periods of time; exposure of the secret key corresponding to a given ...
Ran Canetti, Shai Halevi, Jonathan Katz
openaire   +1 more source

Targeted modulation of IGFL2‐AS1 reveals its translational potential in cervical adenocarcinoma

open access: yesMolecular Oncology, EarlyView.
Cervical adenocarcinoma patients face worse outcomes than squamous cell carcinoma counterparts despite similar treatment. The identification of IGFL2‐AS1's differential expression provides a molecular basis for distinguishing these histotypes, paving the way for personalized therapies and improved survival in vulnerable populations globally.
Ricardo Cesar Cintra   +6 more
wiley   +1 more source

Establishment of a humanized patient‐derived xenograft mouse model of high‐grade serous ovarian cancer for preclinical evaluation of combination immunotherapy

open access: yesMolecular Oncology, EarlyView.
We have established a humanized orthotopic patient‐derived xenograft (Hu‐oPDX) mouse model of high‐grade serous ovarian cancer (HGSOC) that recapitulates human tumor–immune interactions. Using combined anti‐PD‐L1/anti‐CD73 immunotherapy, we demonstrate the model's improved biological relevance and enhanced translational value for preclinical ...
Luka Tandaric   +10 more
wiley   +1 more source

Optimal Power Allocation for A Massive MIMO Relay Aided Secure Communication

open access: yes, 2015
In this paper, we address the problem of optimal power allocation at the relay in two-hop secure communications under practical conditions. To guarantee secure communication during the long-distance transmission, the massive MIMO (M-MIMO) relaying ...
Chen, Jian   +2 more
core   +1 more source

Forward-secure ciphertext-policy attribute-based encryption scheme

open access: yesTongxin xuebao, 2014
To mitigate the damage of key exposure in the context of ciphertext-policy attribute-based encryption (CP-ABE). The syntax and security model of forward-secure CP-ABE was presented. Then, a concreted forward-secure CP-ABE scheme was constructed.
EIJiang-hong W, IUWen-fen L, UXue-xian H
doaj   +2 more sources

CD47 promotes mitogen‐activated protein kinase and epithelial‐to‐mesenchymal transition molecular programs to drive prometastatic phenotypes in non‐small cell lung cancer

open access: yesMolecular Oncology, EarlyView.
Beyond its role in immune evasion, this study identified that CD47 drives tumor‐intrinsic signaling in non‐small cell lung cancer (NSCLC). Transcriptomic profiling and functional studies revealed that CD47 regulates cell adhesion, migration, and metastasis through an ERK–EMT signaling axis.
Asa P.Y. Lau   +8 more
wiley   +1 more source

Dark clouds on the horizon:the challenge of cloud forensics [PDF]

open access: yes, 2018
We introduce the challenges to digital forensics introduced by the advent and adoption of technologies, such as encryption, secure networking, secure processors and anonymous routing.
Ferguson, R. Ian   +2 more
core   +1 more source

Joint Power Splitting and Secure Beamforming Design in the Multiple Non-regenerative Wireless-powered Relay Networks

open access: yes, 2015
The physical-layer security issue in the multiple non-regenerative wireless-powered relay (WPR) networks is investigated in this letter, where the idle relay is treated as a potential eavesdropper. To guarantee secure communication, the destination-based
Feng, Suili   +2 more
core   +1 more source

KDM7A and KDM1A inhibition suppresses tumour promoting pathways in prostate cancer

open access: yesMolecular Oncology, EarlyView.
Treatment resistance is a major challenge for patients with advanced prostate cancer. This study examined an alternative approach to target the major prostate cancer‐promoting pathway by targeting epigenetic factors, whose levels are higher in tumours.
Jennie N Jeyapalan   +16 more
wiley   +1 more source

Home - About - Disclaimer - Privacy