Results 101 to 110 of about 59,119 (273)

An Identity-based Cryptography Scheme Based on FullIdent Algorithm

open access: yesJournal of Computers, 2014
FullIdent is an identity-based cryptography (IBC) algorithm which is proposed by Boneh and Franklin. In this paper, we give a new identity-based cryptography scheme based on FullIdent. Comparing to FullIdent, our new one concludes three improvements. First, there is no IDMapToPoint function when a sender encrypt message with our scheme.
Yumin Xie, Muhammad Kamran
openaire   +1 more source

EDNRB‐dependent endothelin signaling reduces proliferation and promotes proneural‐to‐mesenchymal transition in gliomas

open access: yesMolecular Oncology, EarlyView.
Glioma cells mainly express the endothelin receptor EDNRB, while EDNRA is restricted to a perivascular tumor subpopulation. Endothelin signaling reduces glioma cell proliferation while promoting migration and a proneural‐to‐mesenchymal transition associated with poor prognosis. This pathway activates Ca2+, K+, ERK, and STAT3 signalings and is regulated
Donovan Pineau   +36 more
wiley   +1 more source

Keratin 19 as a prognostic marker and contributing factor of metastasis and chemoresistance in high‐grade serous ovarian cancer

open access: yesMolecular Oncology, EarlyView.
Keratin 19 (KRT19) is overexpressed in high‐grade serous ovarian cancer with high levels of Kallikrein‐related peptidases (KLK) 4–7 and is associated with poor survival. In vivo analyses demonstrate that elevated KRT19 increases peritoneal tumour burden.
Sophia Bielesch   +13 more
wiley   +1 more source

Somatic mutational landscape in von Hippel–Lindau familial hemangioblastoma

open access: yesMolecular Oncology, EarlyView.
The causes of central nervous system (CNS) hemangioblastoma in Von Hippel–Lindau (vHL) disease are unclear. We used Whole Exome Sequencing (WES) on familial hemangioblastoma to investigate events that underlie tumor development. Our findings suggest that VHL loss creates a permissive environment for tumor formation, while additional alterations ...
Maja Dembic   +5 more
wiley   +1 more source

A survey on the security technology of edge computing

open access: yes大数据, 2019
With the continuous development of Internet of things applications,a large number of mobile terminal devices participate in service computing.Traditional cloud computing models cannot adapt to the rapid growth of data generated by network edge devices ...
Jie LING   +3 more
doaj  

Hippo pathway at the crossroads of stemness and therapeutic resistance in breast cancer

open access: yesMolecular Oncology, EarlyView.
Dysregulation of the Hippo pathway drives nuclear accumulation of YAP/TAZ, activating stemness‐related transcriptional programs that sustain breast cancer stemness and fuel therapeutic resistance across subtypes, underscoring Hippo signaling as a targetable vulnerability. Figure created and edited with BioRender.com.
Giulia Schiavoni   +11 more
wiley   +1 more source

An extended identity-based cryptography protocol based on biometric

open access: yesInternational Journal of Information Privacy, Security and Integrity, 2016
Wireless mesh network (WMN) is a very promising technology for extending existing networks with its easy-to-deploy architecture. The wireless backbone serves to interconnect different networking technologies through mesh routers (MRs). MRs act either as access points for end users, as gateways to external (internet) networks, or as routers relaying ...
Zouheir Trabelsi, Mohammad M. Masud
openaire   +1 more source

Deciphering transcriptional plasticity in pancreatic ductal adenocarcinoma reveals alterations in sensory neuron innervation

open access: yesMolecular Oncology, EarlyView.
Pancreatic sensory neurons innervating healthy and PDAC tissue were retrogradely labeled and profiled by single‐cell RNA sequencing. Tumor‐associated innervation showed a dominant neurofilament‐positive subtype, altered mitochondrial gene signatures, and reduced non‐peptidergic neurons.
Elena Genova   +14 more
wiley   +1 more source

Cross-domain authentication scheme based on consortium blockchain

open access: yes网络与信息安全学报, 2022
To solve the security problems of traditional cross-domain authentication schemes, such as single point of failure and excessive dependence on third parties, a cross-domain authentication scheme was proposed which combines IBC and consortium blockchain ...
Jianlin NIU, Zhiyu REN, Xuehui DU
doaj  

CCDC80 suppresses high‐grade serous ovarian cancer migration via negative regulation of B7‐H3

open access: yesMolecular Oncology, EarlyView.
PAX8 is a lineage‐specific master regulator of transcription in high‐grade serous ovarian cancer (HGSC) progression. We show for the first time that PAX8 facilitates proliferation and metastasis by repressing the cell autonomous tumor suppressor CCDC80 and inducing B7‐H3 expression.
Aya Saleh   +12 more
wiley   +1 more source

Home - About - Disclaimer - Privacy