Results 111 to 120 of about 10,953 (251)
Achieving efficient dynamic cryptographic access control in cloud storage
To keep the data in the cloud confidential against unauthorized parties,a cryptographic access control solution called hybrid cloud re-encryption(HCRE) based on attribute-based encryption(ABE) was introduced.HCRE designed a secret sharing scheme to ...
HONG Cheng, ZHANG Min, FENG Deng-guo
doaj +2 more sources
Fingerprint template protection by adopting random projection based on re-encryption
In random projection (RP) based biometric template protection methods,the generated template and key are vulnerable to attacks,which may cause the leakage of users’ privacy.To solve this problem,an improved RP-based fingerprint template protection method
Shan JIA +3 more
doaj
To integrate multiple transcriptomics data with severe batch effects for identifying MB subtypes, we developed a novel and accurate computational method named RaMBat, which leveraged subtype‐specific gene expression ranking information instead of absolute gene expression levels to address batch effects of diverse data sources.
Mengtao Sun, Jieqiong Wang, Shibiao Wan
wiley +1 more source
Meta‐transcriptome analysis identified FGF19 as a peptide enteroendocrine hormone associated with colorectal cancer prognosis. In vivo xenograft models showed release of FGF19 into the blood at levels that correlated with tumor volumes. Tumoral‐FGF19 altered murine liver metabolism through FGFR4, thereby reducing bile acid synthesis and increasing ...
Jordan M. Beardsley +5 more
wiley +1 more source
Hybrid-structured onion scheme against replay attack of MIX
Replay attack against MIX was studied and a hybrid-structured onion scheme of MIX against replay attack was proposed.In hybrid scheme, probabilistic encryption and semantic security of universal re-encryption were utilized to protect MIX against replay ...
SHI Jin-qiao +3 more
doaj
Subtype‐specific enhancer RNAs define transcriptional regulators and prognosis in breast cancers
This study employed machine learning methodologies to perform the subtype‐specific classification of RNA‐seq data sets, which are mapped on enhancers from TCGA‐derived breast cancer patients. Their integration with gene expression (referred to as ProxCReAM eRNAs) and chromatin accessibility profiles has the potential to identify lineage‐specific and ...
Aamena Y. Patel +6 more
wiley +1 more source
An Improved Proxy Re-Encryption Scheme for IoT-Based Data Outsourcing Services in Clouds. [PDF]
Lin HY, Hung YM.
europepmc +1 more source
Aldehyde dehydrogenase 1A1 (ALDH1A1) is a cancer stem cell marker in several malignancies. We established a novel epithelial cell line from rectal adenocarcinoma with unique overexpression of this enzyme. Genetic attenuation of ALDH1A1 led to increased invasive capacity and metastatic potential, the inhibition of proliferation activity, and ultimately ...
Martina Poturnajova +25 more
wiley +1 more source
Tumors contain diverse cellular states whose behavior is shaped by context‐dependent gene coordination. By comparing gene–gene relationships across biological contexts, we identify adaptive transcriptional modules that reorganize into distinct vulnerability axes.
Brian Nelson +9 more
wiley +1 more source
Electronic health records (EHRs) have become a crucial application in cloud computing environments, necessitating advanced privacy-preserving access control mechanisms. Ciphertext policy attribute-based encryption (CP-ABE) is a widely recognized solution
Khanadech Worapaluk, Somchart Fugkeaw
doaj +1 more source

