New key management scheme lattice-based for clustered wireless sensor networks. [PDF]
Zhang J, Liu Q.
europepmc +1 more source
The LINC01116 long noncoding RNA is induced by hypoxia and associated with poor prognosis and high recurrence rates in two cohorts of lung adenocarcinoma patients. Here, we demonstrate that besides its expression in cancer cells, LINC01116 is markedly expressed in lymphatic endothelial cells of the tumor stroma in which it participates in hypoxia ...
Marine Gautier‐Isola +12 more
wiley +1 more source
Butterfly Encryption Scheme for Resource-Constrained Wireless Networks
Resource-constrained wireless networks are emerging networks such as Radio Frequency Identification (RFID) and Wireless Body Area Networks (WBAN) that might have restrictions on the available resources and the computations that can be performed.
Raghav V. Sampangi, Srinivas Sampalli
doaj +1 more source
Dynamic coefficient symmetric polynomial-based secure key management scheme for Internet of Things (IoT) networks. [PDF]
Liu Z, Luo Y.
europepmc +1 more source
ATF4‐mediated stress response as a therapeutic vulnerability in chordoma
We screened 5 chordoma cell lines against 100+ inhibitors of epigenetic and metabolic pathways and kinases and identified halofuginone, a tRNA synthetase inhibitor. Mechanistically halofuginone induces an integrated stress response, with eIF2alpha phosphorylation, activation of ATF4 and its target genes CHOP, ASNS, INHBE leading to cell death ...
Lucia Cottone +11 more
wiley +1 more source
Cryptographic Protection in Maintenance and Management System of Ground Vehicles
This article is devoted to the implementation of the cryptographic protection of messages passed between the on-board terminals (BT) and control centers (CC) in maintenance and management system of ground vehicles.
M. M. Gruntovich, A. N. Syomkin
doaj
Attack Algorithm for a Keystore-Based Secret Key Generation Method
A new attack algorithm is proposed for a secure key generation and management method introduced by Yang and Wu. It was previously claimed that the key generation method of Yang and Wu using a keystore seed was information-theoretically secure and could ...
Seungjae Chae +3 more
doaj +1 more source
Software-Defined Networking Orchestration for Interoperable Key Management of Quantum Key Distribution Networks. [PDF]
Sim DH, Shin J, Kim MH.
europepmc +1 more source
A subset of MMR‐proficient colon cancers responds to neoadjuvant immunotherapy
Tan et al. reveal that a distinct subset of early‐stage pMMR colon cancers can respond to neoadjuvant immunotherapy. In the NICHE‐2 trial, responders (26%) were characterized by chromosomal instability, TP53 mutations, and proliferative cell‐cycle programs, whereas nonresponders showed metabolic and stromal reprogramming with TGF‐β‐driven ...
Eleonora Piumatti +3 more
wiley +1 more source
Provably Secure Receiver-Unrestricted Group Key Management Scheme for Mobile Ad Hoc Networks. [PDF]
Zhang R, Han W, Zhang L, Wang L, Meng X.
europepmc +1 more source

