Results 161 to 170 of about 573,752 (297)
Lightweight image encryption for wireless sensor networks using optimized elliptic curve and fuzzy logic. [PDF]
Zarei M +3 more
europepmc +1 more source
Research on the application of quantum-secure algorithms in 5G network
With the widespread application of 5G networks, data transmission speed and capacity have been significantly improved, promoting innovative development in fields such as the Internet of things, autonomous driving, and telemedicine.
WANG Congli +5 more
doaj
A long‐lived, five‐cell‐type human neurovascular (PENTA) model recreates vascular disorganization and incomplete repair after traumatic brain injury (TBI). By integrating endothelial, glial, neuronal, and immune components within a 3D scaffold, the platform enables time‐resolved analysis of neurovascular remodeling and provides a human‐relevant system ...
Daniel S. Hinrichsen +6 more
wiley +1 more source
A Survey on Proof of Sequential Work: Development, Security Analysis, and Application Prospects. [PDF]
Zhang J +7 more
europepmc +1 more source
Certificateless Public Key Cryptography
Sattam S. Al-Riyami, Kenneth G. Paterson
semanticscholar +1 more source
Cerebral organoids are transforming brain research, yet the field remains fragmented. This comprehensive systematic review maps 738 studies published between 2014 and 2024 to uncover trends, gaps, and opportunities across neuroscience. Introducing OrganoidMap—an interactive, open‐access platform to explore and compare models—this work enables ...
Anna Wolfram +10 more
wiley +1 more source
TTEA: designing a quantum-ready and energy-conscious encryption model for secure IoT environments. [PDF]
Abdelaal MA +3 more
europepmc +1 more source
Model‐Driven Optimization of Subcutaneous Polymer Prodrugs Achieves Cancer Remission in Mice
A pharmacokinetics/pharmacodynamics (PK/PD) model was developed to evaluate multiple dosing regimens for subcutaneously administered water‐soluble polymer prodrug for cancer therapy. The model enabled prediction of in vivo performance and contributed to the optimization of anticancer efficacy.
Anne Rodallec +5 more
wiley +1 more source
A secure multi phase authentication protocol for cloud infrastructure using elliptic curve cryptography. [PDF]
Sivasankar R, Marikkannan M.
europepmc +1 more source
This review examines how in vitro electrical and mechanical stimulation modulates wound healing in fibroblasts and keratinocytes. Analyzing over 560 experimental data points, we relate stimulation parameters to proliferation and migration outcomes, evaluate platform designs, and highlight the need for multi‐parameter optimization to advance targeted ...
Matthew K. Burgess +3 more
wiley +1 more source

