Results 71 to 80 of about 1,483,664 (290)
Authentication and Delegation for Operating a Multi-Drone System
As the era of IoT comes, drones are in the spotlight as a mobile medium of Internet of Things (IoT) devices and services. However, drones appear to be vulnerable to physical capture attacks since they usually operate far from operators.
Mungyu Bae, Hwangnam Kim
doaj +1 more source
This study highlights the potential of automated enumeration using the ACCEPT software to refine circulating tumor cell (CTC) detection in metastatic colorectal cancer (mCRC). The automated method demonstrates improved accuracy and reduced variability compared to the manual approach.
Michela De Meo +6 more
wiley +1 more source
Survey of key management schemes for cluster networks
With the rapid development of artificial intelligence and communication network technology, increasing attention has been paid to cluster intelligence.Cluster network is an important part of cluster intelligence, the security of information interaction ...
Jun LIU, Lin YUAN, Zhishang FENG
doaj
Butterfly Encryption Scheme for Resource-Constrained Wireless Networks
Resource-constrained wireless networks are emerging networks such as Radio Frequency Identification (RFID) and Wireless Body Area Networks (WBAN) that might have restrictions on the available resources and the computations that can be performed.
Raghav V. Sampangi, Srinivas Sampalli
doaj +1 more source
Enhancing IoT Security: An Innovative Key Management System for Lightweight Block Ciphers. [PDF]
Rana M, Mamun Q, Islam R.
europepmc +1 more source
A synthetic benzoxazine dimer derivative targets c‐Myc to inhibit colorectal cancer progression
Benzoxazine dimer derivatives bind to the bHLH‐LZ region of c‐Myc, disrupting c‐Myc/MAX complexes, which are evaluated from SAR analysis. This increases ubiquitination and reduces cellular c‐Myc. Impairing DNA repair mechanisms is shown through proteomic analysis.
Nicharat Sriratanasak +8 more
wiley +1 more source
Attack Algorithm for a Keystore-Based Secret Key Generation Method
A new attack algorithm is proposed for a secure key generation and management method introduced by Yang and Wu. It was previously claimed that the key generation method of Yang and Wu using a keystore seed was information-theoretically secure and could ...
Seungjae Chae +3 more
doaj +1 more source
New key management scheme lattice-based for clustered wireless sensor networks. [PDF]
Zhang J, Liu Q.
europepmc +1 more source
Adaptaquin selectively kills glioma stem cells while sparing differentiated brain cells. Transcriptomic and proteomic analyses show Adaptaquin disrupts iron and cholesterol homeostasis, with iron chelation amplifying cytotoxicity via cholesterol depletion, mitochondrial dysfunction, and elevated reactive oxygen species.
Adrien M. Vaquié +16 more
wiley +1 more source
Dynamic coefficient symmetric polynomial-based secure key management scheme for Internet of Things (IoT) networks. [PDF]
Liu Z, Luo Y.
europepmc +1 more source

