Results 31 to 40 of about 3,852 (258)

A mutual exclusion key pairing scheme for preserving the privacy of channel shared 5G users

open access: yesAlexandria Engineering Journal
The fifth generation (5G) network ensures terahertz communication and low latency features to improve the Quality of Service (QoS). Based on the communication and service demands, the security and privacy requirements of the users directly impact the QoS.
Meshari D. Alanazi   +7 more
doaj   +1 more source

A Mutual Authentication Scheme for Secure Fog Computing Service Handover in Vehicular Network Environment

open access: yesIEEE Access, 2019
Handover schemes play a vital role on fog computing service (FCS) provided through vehicular network. It not only determines the quality of services (QoSs) but also the security and safety of vehicular network system against adversaries.
Favian Dewanta, Masahiro Mambo
doaj   +1 more source

Network divergence analysis identifies adaptive gene modules and two orthogonal vulnerability axes in pancreatic cancer

open access: yesMolecular Oncology, EarlyView.
Tumors contain diverse cellular states whose behavior is shaped by context‐dependent gene coordination. By comparing gene–gene relationships across biological contexts, we identify adaptive transcriptional modules that reorganize into distinct vulnerability axes.
Brian Nelson   +9 more
wiley   +1 more source

Comments on “ALAM: Anonymous Lightweight Authentication Mechanism for SDN Enabled Smart Homes”

open access: yesIEEE Access, 2021
Smart home is intended to be able to enhance home automation systems and achieves goals such as reducing operational costs and increasing comfort while providing security to mobile users.
Sungjin Yu   +2 more
doaj   +1 more source

Fast Mutual Authentication Using RSA Moduli [PDF]

open access: yes, 2021
We describe a fast three-round mutual authentication protocol for parties A and B belonging to the same coalition group. Parties A and B keep their own independent long-term private keys that are used in the process of authentication and can be used for other purposes. The scheme assumes an initial setup with a trusted third party T.
Andrey Novokshonov, Anatoly Anisimov
openaire   +1 more source

IMPDH inhibition enhances cytarabine efficacy in SAMHD1‐expressing leukaemia cells via guanine nucleotide depletion

open access: yesMolecular Oncology, EarlyView.
Cytarabine is a key therapy for acute myeloid leukaemia (AML), but its efficacy is limited by the dNTPase SAMHD1, which hydrolyses its active metabolite. Screening nucleotide biosynthesis inhibitors revealed that IMPDH inhibitors selectively sensitise SAMHD1‐proficient AML cells to cytarabine.
Miriam Yagüe‐Capilla   +9 more
wiley   +1 more source

Light-weight Mutual Authentication with Non-repudiation [PDF]

open access: yesRadioengineering, 2018
In this paper, we focused on a problem of authentication on low-cost devices. We have proposed a new light-weight protocol for mutual authentication of communication entities with non-repudiation of realized events.
V. Clupek, V. Zeman, P. Dzurenda
doaj  

On the Security of a Lightweight and Secure Access Authentication Scheme for Both UE and mMTC Devices in 5G Networks

open access: yesApplied Sciences, 2022
The Internet of Things (IoT) and 5G networks play important roles in the latest systems for managing and monitoring various types of data. These 5G based IoT environments collect various data in real-time using micro-sensors as IoT things devices and ...
Kisung Park, Youngho Park
doaj   +1 more source

Cell‐cycle‐specific lesion evolution rather than inhibition of double‐strand‐break repair underpins cisplatin radiosensitization

open access: yesMolecular Oncology, EarlyView.
We analyze cisplatin–DNA adducts (CDAs) and double‐strand breaks (DSBs) in a cell‐cycle‐dependent manner. We find that CDAs form similarly across all cell cycle phases. DSBs arise only in S‐phase. CDAs might not directly impair DSB repair, but S‐phase DSB lesions evolve in the presence of CDAs and disrupt repair in G2, also causing radiosensitization ...
Ye Qiu   +10 more
wiley   +1 more source

A Remote User Security Authentication Scheme Using Smart Card and Password Protection for WSN

open access: yesDianxin kexue, 2015
For the issues that the user remote security authentication for wireless sensor network(WSN), and the defects of the existing schemes, a remote user security authentication scheme of using smart card for WSN was proposed.
Liping Liu
doaj   +2 more sources

Home - About - Disclaimer - Privacy