Results 61 to 70 of about 20,722 (263)

Performance Analysis of Non-Pairing Hierarchical Identity-Based Encryption in Active Distribution System

open access: yesIEEE Access
The evolution of traditional power grids into smart grids has enabled two-way Internet of Things (IoT)-based communication between utilities and devices or consumers, improving energy distribution and efficient service to the end-users.
Naveen Tatipatri, S. L. Arun
doaj   +1 more source

A Social-Network-Based Cryptocurrency Wallet-Management Scheme

open access: yesIEEE Access, 2018
Effective cryptocurrency key management has become an urgent requirement for modern cryptocurrency. Although a large body of cryptocurrency wallet-management schemes has been proposed, they are mostly constructed for specific application scenarios and ...
Shuangyu He   +7 more
doaj   +1 more source

Aging Is a Key Driver for Adult Acute Myeloid Leukemia

open access: yesAging and Cancer, EarlyView.
Acute myeloid leukemia (AML) is a classical age‐related hematologic malignancy, and a key driver of AML is aging, which profoundly regulates intrinsic factors such as genomic instability, epigenetic reprogramming, and metabolic dysregulation, and alters bone marrow microenvironment.
Rong Yin, Haojian Zhang
wiley   +1 more source

Hierarchical identity-based broadcast encryption scheme from LWE

open access: yesJournal of Communications and Networks, 2014
A hierarchical identity-based broadcast encryption (H-IBBE) scheme is an identity-based broadcast encryption (IBBE) scheme in a hierarchical environment. In order to obtain secure H-IBBE schemes in the quantum era, we propose an H-IBBE scheme based on the learning with errors problem assumption.
Chunli Yang   +4 more
openaire   +1 more source

Mutant NPM1 in Acute Myeloid Leukemia Initiation and Maintenance

open access: yesAging and Cancer, EarlyView.
NPM1 mutations drive acute myeloid leukemia by acting as neomorphic transcriptional regulators that cooperate with Menin–MLL and XPO1 to sustain HOX/MEIS1 expression and block differentiation. Targeting these mutant‐specific transcriptional dependencies provides a rational therapeutic strategy for NPM1‐mutated AML.
Yanan Jiang   +3 more
wiley   +1 more source

Developmental, Neuroanatomical and Cellular Expression of Genes Causing Dystonia

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Dystonia is one of the most common movement disorders, with variants in multiple genes identified as causative. However, an understanding of which developmental stages, brain regions, and cell types are most relevant is crucial for developing relevant disease models and therapeutics.
Darren Cameron   +5 more
wiley   +1 more source

A new security architecture for SIP based P2P computer networks [PDF]

open access: yes, 2008
Many applications are transferred from C/S (Client/Server) mode to P2P (Peer-to-Peer) mode such as VoIP (Voice over IP). This paper presents a new security architecture, i.e.
Tang, S, Yip, YJ, Yongfeng, H
core  

Value of MRI Outcomes for Preventive and Early‐Stage Trials in Spinocerebellar Ataxias 1 and 3

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective To examine the value of MRI outcomes as endpoints for preventive and early‐stage trials of two polyglutamine spinocerebellar ataxias (SCAs). Methods A cohort of 100 participants (23 SCA1, 63 SCA3, median Scale for the Assessment and Rating of Ataxia (SARA) score = 5, 42% preataxic, and 14 gene‐negative controls) was scanned at 3T up ...
Thiago J. R. Rezende   +26 more
wiley   +1 more source

Privacy-Enhanced Data Sharing Systems from Hierarchical ID-Based Puncturable Functional Encryption with Inner Product Predicates

open access: yesIET Information Security
The emergence of cloud computing enables users to upload data to remote clouds and compute them. This drastically reduces computing and storage costs for users.
Cheng-Yi Lee   +3 more
doaj   +1 more source

Multimodal Data‐Driven Microstructure Characterization

open access: yesAdvanced Engineering Materials, EarlyView.
A self‐consistent autonomous workflow for EBSP‐based microstructure segmentation by integrating PCA, GMM clustering, and cNMF with information‐theoretic parameter selection, requiring no user input. An optimal ROI size related to characteristic grain size is identified.
Qi Zhang   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy