Results 51 to 60 of about 1,483,664 (290)
Cotargeting EGFR and STAT3 with Erlotinib and TTI‐101 impairs both 2D and 3D growth of ETV1‐overexpressing prostate cancer cells by disrupting a self‐sustaining ETV1–EGFR positive feedback loop that promotes EGFR and STAT3 expression and phosphorylation (activation).
Elsa Gomes Paiva +5 more
wiley +1 more source
A Decentralized Proxy-JRC Authentication System for Scalable IETF 6TiSCH Networks
Many Industrial Internet of Things (IIoT) applications require wireless networks with low power consumption, low latency, and secure communication. The IPv6 over the TSCH mode of IEEE 802.15.4e (IETF 6TiSCH) standard has been created to fulfill these ...
Hakan Aydin, Sedat Gormus, Burak Aydin
doaj +1 more source
Research on key management scheme for military vehicle network
A scheme of military vehicle network security based on the hierarchical tree structure was proposed,which could improve communication efficiency and security of military vehicle network key management.The proposed scheme provides a good solution to solve
Junjie LIU,Jia ZHAO,Jiqiang LIU +2 more
doaj +1 more source
With the wide use of online social networks (OSNs), the problem of data privacy has attracted a lot of attention from not only the research community but also the general public.
Guanglai Guo +4 more
doaj +1 more source
Chimeric diphtheria toxin–CCL8 cytotoxic peptide for breast cancer management
DTCCL8 is a recombinant fusion toxin that targets cancer cells expressing chemokine receptors. By combining diphtheria toxin with CCL8, DTCCL8 binds to multiple receptors on tumor cells and induces selective cytotoxicity. This strategy enables receptor‐mediated targeting of cancer and may support the development of chemokine‐guided therapeutics ...
Bernardo Chavez +5 more
wiley +1 more source
Novel key management and authentication scheme for ad hoc space networks
To be implemented using a flexible distributed architecture consisting of a constellation of dynamically de-ployed or configured satellites that were networked together into an integrated information system,the satellites could form an ad hoc self ...
YANG De-ming, MU De-jun, XU Zhong
doaj
Small extracellular vesicles are a promising source of diagnostic molecules. We conducted a comprehensive study, including transcriptome profiling and RT‐qPCR validation on large cohorts of samples. Diagnostic panels enabling sensitive detection of colorectal cancer and precancerous lesions were established. Some molecules were differentially expressed
Petra Vychytilova‐Faltejskova +26 more
wiley +1 more source
Survey of wireless sensor network security techniques
The current situations of sensor network security,the security challenges and the security problems were pre-sented.From the aspects of key management,secure routing,authentication,intrusion detection,DoS attack,access con-trol,all the security ...
PEI Qing-qi1 +2 more
doaj
RKIP, a metastasis suppressor protein, modulates key oncogenic pathways in lung adenocarcinoma. In silico analyses linked low RKIP expression to poor survival. Functional studies revealed RKIP overexpression reduces tumor aggressiveness and enhances sensitivity to EGFR‐targeted therapies, while its loss promotes resistance.
Ana Raquel‐Cunha +10 more
wiley +1 more source
Research on large-scale identity authentication architecture based on combined symmetric key
A large-scale real-name authentication architecture and key management protocol based on combined symmet-ric key algorithm were proposed.With the CSK algorithm and smart card technology, the authentication process can be finished in the chips, and the ...
LIU Tong, XU Guan-ning
doaj

