Results 131 to 140 of about 7,509,795 (332)

Identity-Based Encryption from the Weil Pairing

open access: yesAnnual International Cryptology Conference, 2001
D. Boneh, M. Franklin
semanticscholar   +1 more source

Demystifying authenticity: Behavioral and neurophysiological signatures of self-positivity for authentic and presented selves

open access: yesNeuroImage
Authenticity has captivated scholars. But what is it? An emerging view considers it exaggerated favorability (self-enhancement), whereas traditional views regard it as self-accuracy and self-consistency.
Chengli Huang   +7 more
doaj   +1 more source

PICALM::MLLT10 translocated leukemia

open access: yesFEBS Letters, EarlyView.
This comprehensive review of PICALM::MLLT10 translocated acute leukemia provides an in‐depth review of the structure and function of CALM, AF10, and the fusion oncoprotein (1). The multifaceted molecular mechanisms of oncogenesis, including nucleocytoplasmic shuttling (2), epigenetic modifications (3), and disruption of endocytosis (4), are then ...
John M. Cullen   +7 more
wiley   +1 more source

Disturbing Femininity

open access: yesCulture Unbound: Journal of Current Cultural Research, 2013
When Helle Thorning-Schmidt in 2011 became the first female Prime Minister in Denmark, this “victory for the women” was praised in highly celebratory tones in Danish newspapers.
Kirsten Hvenegård-Lassen
doaj  

Medical care for transgender individuals at a hospital in southern Brazil: why do they drop out from our service?

open access: yesFrontiers in Public Health
ObjectiveThe objective of the study was to investigate dropout rates and discern potential factors contributing to the discontinuation of treatment provided to transgender individuals by the Transdisciplinary Gender Identity Program at the Hospital de ...
Fernanda Guadagnin   +10 more
doaj   +1 more source

Cell wall target fragment discovery using a low‐cost, minimal fragment library

open access: yesFEBS Letters, EarlyView.
LoCoFrag100 is a fragment library made up of 100 different compounds. Similarity between the fragments is minimized and 10 different fragments are mixed into a single cocktail, which is soaked to protein crystals. These crystals are analysed by X‐ray crystallography, revealing the binding modes of the bound fragment ligands.
Kaizhou Yan   +5 more
wiley   +1 more source

Inhibiting stearoyl‐CoA desaturase suppresses bone metastatic prostate cancer by modulating cellular stress, mTOR signaling, and DNA damage response

open access: yesFEBS Letters, EarlyView.
Bone metastasis in prostate cancer (PCa) patients is a clinical hurdle due to the poor understanding of the supportive bone microenvironment. Here, we identify stearoyl‐CoA desaturase (SCD) as a tumor‐promoting enzyme and potential therapeutic target in bone metastatic PCa.
Alexis Wilson   +7 more
wiley   +1 more source

Identity-Based Cryptosystems and Signature Schemes

open access: yesAnnual International Cryptology Conference, 1984
A. Shamir
semanticscholar   +1 more source

The Music Identity Project

open access: yes, 2013
At MayDay Group Colloquium 24 in East Lansing, MI, Sandra Stauffer (2012) charged that: If we want change, we need to start telling different stories . . . we work with beginning teachers, and we worry about teacher identities.
Talbot, Brent C.
core  

Home - About - Disclaimer - Privacy