Results 61 to 70 of about 10,953 (251)

Disordered but rhythmic—the role of intrinsic protein disorder in eukaryotic circadian timing

open access: yesFEBS Letters, EarlyView.
Unstructured domains known as intrinsically disordered regions (IDRs) are present in nearly every part of the eukaryotic core circadian oscillator. IDRs enable many diverse inter‐ and intramolecular interactions that support clock function. IDR conformations are highly tunable by post‐translational modifications and environmental conditions, which ...
Emery T. Usher, Jacqueline F. Pelham
wiley   +1 more source

PostgreSQL System Access Control Method Based on Proxy Re-encryption [PDF]

open access: yesJisuanji gongcheng, 2018
In view of the current status of frequent database privacy data leakage incidents,the RSA-based proxy re-encryption authorization access method is designed,and on the basis of it,an optimization method based on a symmetric encryption system is proposed ...
LIU Hongchao,MIAO Yan,HAO Hanyong,YANG Libing,WU Fan
doaj   +1 more source

Practical Schemes For Privacy & Security Enhanced RFID

open access: yes, 2009
Proper privacy protection in RFID systems is important. However, many of the schemes known are impractical, either because they use hash functions instead of the more hardware efficient symmetric encryption schemes as a efficient cryptographic primitive,
Hoepman, J.H., Joosten, R., Samarati, P.
core   +5 more sources

Protein pyrophosphorylation by inositol pyrophosphates — detection, function, and regulation

open access: yesFEBS Letters, EarlyView.
Protein pyrophosphorylation is an unusual signaling mechanism that was discovered two decades ago. It can be driven by inositol pyrophosphate messengers and influences various cellular processes. Herein, we summarize the research progress and challenges of this field, covering pathways found to be regulated by this posttranslational modification as ...
Sarah Lampe   +3 more
wiley   +1 more source

Biallelic Inactivation of NSD1 Associated With Carcinogenesis in Sotos Syndrome

open access: yes
Pediatric Blood &Cancer, EarlyView.
Nicholas A. Borja   +8 more
wiley   +1 more source

Multiple ETS family transcription factors bind mutant p53 via distinct interaction regions

open access: yesFEBS Letters, EarlyView.
Mutant p53 gain‐of‐function is thought to be mediated by interaction with other transcription factors. We identify multiple ETS transcription factors that can bind mutant p53 and found that this interaction can be promoted by a PXXPP motif. ETS proteins that strongly bound mutant p53 were upregulated in ovarian cancer compared to ETS proteins that ...
Stephanie A. Metcalf   +6 more
wiley   +1 more source

The newfound relationship between extrachromosomal DNAs and excised signal circles

open access: yesFEBS Letters, EarlyView.
Extrachromosomal DNAs (ecDNAs) contribute to the progression of many human cancers. In addition, circular DNA by‐products of V(D)J recombination, excised signal circles (ESCs), have roles in cancer progression but have largely been overlooked. In this Review, we explore the roles of ecDNAs and ESCs in cancer development, and highlight why these ...
Dylan Casey, Zeqian Gao, Joan Boyes
wiley   +1 more source

ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments [PDF]

open access: yes, 2013
The enforcement of security policies in outsourced environments is still an open challenge for policy-based systems. On the one hand, taking the appropriate security decision requires access to the policies.
Asghar, Muhammad Rizwan   +3 more
core   +1 more source

Conserved structural motifs in PAS, LOV, and CRY proteins regulate circadian rhythms and are therapeutic targets

open access: yesFEBS Letters, EarlyView.
Cryptochrome and PAS/LOV proteins play intricate roles in circadian clocks where they act as both sensors and mediators of protein–protein interactions. Their ubiquitous presence in signaling networks has positioned them as targets for small‐molecule therapeutics. This review provides a structural introduction to these protein families.
Eric D. Brinckman   +2 more
wiley   +1 more source

Efficient Unidirectional Proxy Re-Encryption

open access: yes, 2010
Proxy re-encryption (PRE) allows a semi-trusted proxy to convert a ciphertext originally intended for Alice into one encrypting the same plaintext for Bob. The proxy only needs a re-encryption key given by Alice, and cannot learn anything about the plaintext encrypted.
CHOW, Sherman   +3 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy