Results 121 to 130 of about 121,345 (302)
A Secure and Efficient Authentication Scheme with Privacy Protection for Internet of Medical Things. [PDF]
Xu F, Wu J, An Q, Ziaur R.
europepmc +1 more source
TRIM38 Suppresses Breast Cancer Progression via Modulating SQSTM1 Ubiquitination and Autophagic Flux
TRIM38, an E3 ubiquitin ligase, suppresses breast cancer progression by inhibiting proliferation, migration, and invasion. Downregulated in breast tumor, its loss correlates with poor prognosis. Mechanistically, TRIM38 mediates K63‐linked ubiquitination of SQSTM1/p62 at K420, disrupting SQSTM1‐LC3 interaction and blocking autophagic flux.
Shan Jiang +14 more
wiley +1 more source
Game Theory Based Privacy Protection for Context-Aware Services
Yan Huang
openalex +2 more sources
ERM Inhibition Confers Ferroptosis Resistance through ROS‐Induced NRF2 Signaling
ERM inhibition disrupts ERM‐actin interactions, elevating ROS and triggering KEAP1 degradation, which stabilizes and activates NRF2. Nuclear NRF2 induces cytoprotective genes, notably HMOX1, enhancing redox buffering and suppressing lipid peroxidation to resist erastin‐induced ferroptosis.
Menghao Qiao +19 more
wiley +1 more source
Face Privacy Protection Method for Autonomous Sensors Based on Hierarchical Format-Preserving Encryption. [PDF]
Ji H +5 more
europepmc +1 more source
The main message of this position paper is that ubiquitous computing technology need not necessarily be an obstacle to privacy protection: if legal and social issues are given proper consideration, technology can also be used to allow individuals to exercise their rights.
Bryce, Ciaran +7 more
openaire +1 more source
Highly Secure In Vivo DNA Data Storage Driven by Genomic Dynamics
Integrated computational‐biological programming enables secure in vivo data storage by generating code tables from either genomes or gene regulatory networks, expanding the encryption key space by over 100 orders of magnitude. Storing code tables within synthetic genes, genomes, or gene regulatory networks adds an additional layer of security by ...
Jiaxin Xu +9 more
wiley +1 more source
Fine-Grained Personalized Data Aggregation Scheme with High Quality and Privacy Protection. [PDF]
Xia Z, Murugesan RK.
europepmc +1 more source
Deep deterministic policy gradient caching method for privacy protection in Internet of Vehicles
Zihao Shen +4 more
openalex +1 more source

