Results 31 to 40 of about 3,852 (258)
A mutual exclusion key pairing scheme for preserving the privacy of channel shared 5G users
The fifth generation (5G) network ensures terahertz communication and low latency features to improve the Quality of Service (QoS). Based on the communication and service demands, the security and privacy requirements of the users directly impact the QoS.
Meshari D. Alanazi +7 more
doaj +1 more source
Handover schemes play a vital role on fog computing service (FCS) provided through vehicular network. It not only determines the quality of services (QoSs) but also the security and safety of vehicular network system against adversaries.
Favian Dewanta, Masahiro Mambo
doaj +1 more source
Tumors contain diverse cellular states whose behavior is shaped by context‐dependent gene coordination. By comparing gene–gene relationships across biological contexts, we identify adaptive transcriptional modules that reorganize into distinct vulnerability axes.
Brian Nelson +9 more
wiley +1 more source
Comments on “ALAM: Anonymous Lightweight Authentication Mechanism for SDN Enabled Smart Homes”
Smart home is intended to be able to enhance home automation systems and achieves goals such as reducing operational costs and increasing comfort while providing security to mobile users.
Sungjin Yu +2 more
doaj +1 more source
Fast Mutual Authentication Using RSA Moduli [PDF]
We describe a fast three-round mutual authentication protocol for parties A and B belonging to the same coalition group. Parties A and B keep their own independent long-term private keys that are used in the process of authentication and can be used for other purposes. The scheme assumes an initial setup with a trusted third party T.
Andrey Novokshonov, Anatoly Anisimov
openaire +1 more source
Cytarabine is a key therapy for acute myeloid leukaemia (AML), but its efficacy is limited by the dNTPase SAMHD1, which hydrolyses its active metabolite. Screening nucleotide biosynthesis inhibitors revealed that IMPDH inhibitors selectively sensitise SAMHD1‐proficient AML cells to cytarabine.
Miriam Yagüe‐Capilla +9 more
wiley +1 more source
Light-weight Mutual Authentication with Non-repudiation [PDF]
In this paper, we focused on a problem of authentication on low-cost devices. We have proposed a new light-weight protocol for mutual authentication of communication entities with non-repudiation of realized events.
V. Clupek, V. Zeman, P. Dzurenda
doaj
The Internet of Things (IoT) and 5G networks play important roles in the latest systems for managing and monitoring various types of data. These 5G based IoT environments collect various data in real-time using micro-sensors as IoT things devices and ...
Kisung Park, Youngho Park
doaj +1 more source
We analyze cisplatin–DNA adducts (CDAs) and double‐strand breaks (DSBs) in a cell‐cycle‐dependent manner. We find that CDAs form similarly across all cell cycle phases. DSBs arise only in S‐phase. CDAs might not directly impair DSB repair, but S‐phase DSB lesions evolve in the presence of CDAs and disrupt repair in G2, also causing radiosensitization ...
Ye Qiu +10 more
wiley +1 more source
A Remote User Security Authentication Scheme Using Smart Card and Password Protection for WSN
For the issues that the user remote security authentication for wireless sensor network(WSN), and the defects of the existing schemes, a remote user security authentication scheme of using smart card for WSN was proposed.
Liping Liu
doaj +2 more sources

