Results 191 to 200 of about 13,982 (300)
Public-Key Encryption Schemes with Auxiliary Inputs. Theory of Cryptography
Yevgeniy Dodis, Shafi Goldwasser
openalex +1 more source
Design and analysis of a secure image encryption algorithm using proposed non-linear RN chaotic system and ECC/HKDF key derivation with authentication support. [PDF]
Zhiqiang H +5 more
europepmc +1 more source
HSP90α is significantly upregulated in platelets from sepsis patients, with its origin from megakaryocyte‐derived trafficking. Furthermore, activated platelets secrete HSP90α into the extracellular space in both free and exosome‐associated forms. Finally, extracellular HSP90α directly engages TLR4 on neutrophils to induce autophagy, leading to NET ...
Chengbo Wang +17 more
wiley +1 more source
A Cryptocompression System based on H-Rabin Public Key Encryption Algorithm and Elias Gamma Codes
Dian Rachmawati, Muhammad Andri Budiman
openalex +1 more source
A server-assisted secure blockchain model for residential demand response in smart grids. [PDF]
Ghosh A +3 more
europepmc +1 more source
Connexin43 Deficiency Leads to Ventricular Arrhythmias by Reprogramming Proline Metabolism
The study demonstrated that connexin43 (Cx43) knockout caused arrhythmic phenotype and decreased proline content in vitro and in vivo. Mechanistically, Cx43 interacts with the amino acid transporter SNAT2 (sodium‐dependent neutral amino acid transporter), and its deficiency disrupts proline transport and metabolism.
Hangying Ying +8 more
wiley +1 more source
GeoCross: A Privacy-Preserving and Fine-Grained Authorization Scheme for Cross-Chain Geological Data Sharing. [PDF]
Lin L, Feng B, Jing P.
europepmc +1 more source
This study generates high‐fidelity synthetic longitudinal records for a million‐patient diabetes cohort, successfully replicating clinical predictive performance. However, deeper analysis reveals algorithmic biases and trajectory inconsistencies that escape standard quality metrics. These findings challenge current validation norms, demonstrating why a
Francisco Ortuño +5 more
wiley +1 more source
Hybrid cryptographic approach for strengthening IoT and 5G/B5G network security. [PDF]
Kumar A, Singh P, Kamble DP, Singh I.
europepmc +1 more source
Advanced clear cell renal cell carcinoma metastasis is driven by a FOXC2+ tumor subpopulation. These cells execute vasculogenic mimicry for dissemination and secrete LAMA4. LAMA4 engages macrophage ITGA6, activating the STAT6/GATA3 axis to polarize macrophages into a pro‐metastatic, immunosuppressive phenotype.
Jiaxi Yao +11 more
wiley +1 more source

