Results 101 to 110 of about 6,477,960 (317)

Authentication and Delegation for Operating a Multi-Drone System

open access: yesSensors, 2019
As the era of IoT comes, drones are in the spotlight as a mobile medium of Internet of Things (IoT) devices and services. However, drones appear to be vulnerable to physical capture attacks since they usually operate far from operators.
Mungyu Bae, Hwangnam Kim
doaj   +1 more source

PARP inhibitors elicit distinct transcriptional programs in homologous recombination competent castration‐resistant prostate cancer

open access: yesMolecular Oncology, EarlyView.
PARP inhibitors are used to treat a small subset of prostate cancer patients. These studies reveal that PARP1 activity and expression are different between European American and African American prostate cancer tissue samples. Additionally, different PARP inhibitors cause unique and overlapping transcriptional changes, notably, p53 pathway upregulation.
Moriah L. Cunningham   +21 more
wiley   +1 more source

Butterfly Encryption Scheme for Resource-Constrained Wireless Networks

open access: yesSensors, 2015
Resource-constrained wireless networks are emerging networks such as Radio Frequency Identification (RFID) and Wireless Body Area Networks (WBAN) that might have restrictions on the available resources and the computations that can be performed.
Raghav V. Sampangi, Srinivas Sampalli
doaj   +1 more source

A Study on Secure Group Key Management Based on Agent for Multicast Data Transmission [PDF]

open access: bronze, 2011
Bo-Seung Kim   +3 more
openalex   +1 more source

Characterizing the salivary RNA landscape to identify potential diagnostic, prognostic, and follow‐up biomarkers for breast cancer

open access: yesMolecular Oncology, EarlyView.
This study explores salivary RNA for breast cancer (BC) diagnosis, prognosis, and follow‐up. High‐throughput RNA sequencing identified distinct salivary RNA signatures, including novel transcripts, that differentiate BC from healthy controls, characterize histological and molecular subtypes, and indicate lymph node involvement.
Nicholas Rajan   +9 more
wiley   +1 more source

Attack Algorithm for a Keystore-Based Secret Key Generation Method

open access: yesEntropy, 2019
A new attack algorithm is proposed for a secure key generation and management method introduced by Yang and Wu. It was previously claimed that the key generation method of Yang and Wu using a keystore seed was information-theoretically secure and could ...
Seungjae Chae   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy