Results 21 to 30 of about 21,725 (207)

Dual PI3K/mTOR inhibitor PKI-402 suppresses the growth of ovarian cancer cells by degradation of Mcl-1 through autophagy.

open access: yesBiomedicine & pharmacotherapy = Biomedecine & pharmacotherapie, 2020
The phosphoinositide 3-kinase (PI3K) /AKT/mammalian target of rapamycin (mTOR) signaling pathway is frequently mutated in cancers, leading to increased cell proliferation, migration, and chemoresistance.
Xiaoqing Hu   +8 more
semanticscholar   +1 more source

The Kinase Specificity of Protein Kinase Inhibitor Peptide

open access: yesFrontiers in Pharmacology, 2021
G-protein-coupled-receptor (GPCR) signaling is exquisitely controlled to achieve spatial and temporal specificity. The endogenous protein kinase inhibitor peptide (PKI) confines the spatial and temporal spread of the activity of protein kinase A (PKA ...
Yao Chen, Yao Chen, Bernardo L. Sabatini
doaj   +1 more source

Research on Application of Blockchain in PKI Security [PDF]

open access: yesJisuanji kexue yu tansuo
The design idea of emphasizing application and neglecting defense leads to the lack of endogenous security attributes at the beginning of the design of transmission control protocol/Internet protocol (TCP/IP) architecture. Public key infrastructure (PKI),
XIA Lingling, WANG Qun, MA Zhuo, LIANG Guangjun
doaj   +1 more source

Ahmad Tohari’s The dancer: Revisited

open access: yesK@ta: A Biannual Publication on the Study of Language and Literature, 2017
As with many post-colonial countries, Indonesia has suffered from a long conflict between the military and civil society since its independence in 1945. This struggle is reflected in Ahmad Tohari’s novel entitled The dancer (2012), which has been largely
Dwi Setiawan
doaj   +1 more source

Privacy‐aware PKI model with strong forward security

open access: yesInternational Journal of Intelligent Systems, 2020
With the development of network technology, privacy protection and users anonymity become a new research hotspot. The existing blockchain privacy‐aware public key infrastructure (PKI) model can ensure the privacy of users in the authentication process to
Fengyin Li   +5 more
semanticscholar   +1 more source

DINAMIKA KONFLIK ANTARA PERSATUAN GURU REPUBLIK INDONESIA DAN PARTAI KOMUNIS INDONESIA

open access: yesIstoria, 2020
ABSTRAK Persatuan Guru Republik Indonesia atau disingkat PGRI merupakan wadah organisasi yang menampung semua guru di Indonesia. PGRI memiliki peran yang sangat penting dalam pendidikan, terutama dalam perbaikan kualitas guru di Indonesia.
Angga Angga Prasetiyo
doaj   +1 more source

Multi-state recognition pathway of the intrinsically disordered protein kinase inhibitor by protein kinase A

open access: yeseLife, 2020
In the nucleus, the spatiotemporal regulation of the catalytic subunit of cAMP-dependent protein kinase A (PKA-C) is orchestrated by an intrinsically disordered protein kinase inhibitor, PKI, which recruits the CRM1/RanGTP nuclear exporting complex.
Cristina Olivieri   +13 more
doaj   +1 more source

Provable Security for PKI Schemes

open access: yesIACR Cryptology ePrint Archive
PKI schemes provide a critical foundation for applied cryptographic protocols. However, there are no rigorous security specifications for realistic PKI schemes, and therefore, no PKI schemes were proven secure.
Sara Wrótniak   +3 more
semanticscholar   +1 more source

A Comparison of Blockchain-based PKI Implementations

open access: yesInternational Conference on Information Systems Security and Privacy, 2020
: Blockchain technology has recently been proposed by many authors for decentralized key management in the context of Public Key Infrastructures (PKIs).
Clemens Brunner   +3 more
semanticscholar   +1 more source

Post-Quantum PKI: A Survey of Applications and Benchmarking Practices

open access: yesCryptography
Post-quantum cryptography (PQC) is, and should be, currently dominating the field of cybersecurity, with many works designing and evaluating the transition of communications security to quantum-safe solutions. As the security level and implementations of
Maya Thabet   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy