Results 121 to 130 of about 2,429,355 (361)

Adenosine A3 receptor antagonists as anti‐tumor treatment in human prostate cancer: an in vitro study

open access: yesFEBS Open Bio, EarlyView.
The A3 adenosine receptors (A3ARs) are overexpressed in prostate cancer. AR 292 and AR 357, as A3AR antagonists, are capable of blocking proliferation, modulating the expression of drug transporter genes involved in chemoresistance, ferroptosis, and the hypoxia response, and inducing cell death.
Maria Beatrice Morelli   +15 more
wiley   +1 more source

Application of keyword searchable encryption in cloud

open access: yesTongxin xuebao, 2015
Recently,some schemes combined keyword searchable encryption with attribute based encryption,solved access control problem in cloud environment,but they didn’t consider security problems like keyword guessing attack and security channels,so they couldn’t
Peng LIN, Jie JIANG, Tie-ming CHEN
doaj   +2 more sources

The Locality of Searchable Symmetric Encryption [PDF]

open access: yes, 2014
This paper proves a lower bound on the trade-off between server storage size and the locality of memory accesses in searchable symmetric encryption (SSE). Namely, when encrypting an index of N identifier/keyword pairs, the encrypted index must have size ω(N) or the scheme must perform searching with ω(1) non-contiguous reads to memory or the scheme ...
David Cash, Stefano Tessaro
openaire   +1 more source

On subcellular distribution of the zinc finger 469 protein (ZNF469) and observed discrepancy in the localization of endogenous and overexpressed ZNF469

open access: yesFEBS Open Bio, EarlyView.
ZNF469 regulates the expression of genes encoding extracellular matrix proteins. Endogenous ZNF469 is predominantly cytoplasmic, while in transfected cells, it forms aggregates reminiscent of biomolecular condensates, located mainly in the nucleus. These condensates exhibit overlapping staining with proteasomes and are also associated with the mitotic ...
Anne Elisabeth Christensen Mellgren   +8 more
wiley   +1 more source

Forward Secure Conjunctive-Keyword Searchable Encryption

open access: yesIEEE Access, 2019
Searchable symmetric encryption (SSE) has been applied in constructing secure cloud storage for its simplicity, high-efficiency, and practicality. Recent works show that forward privacy has become a fundamental property required for SSE, and several ...
Chengyu Hu   +6 more
doaj   +1 more source

ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments [PDF]

open access: yes, 2013
The enforcement of security policies in outsourced environments is still an open challenge for policy-based systems. On the one hand, taking the appropriate security decision requires access to the policies.
Asghar, Muhammad Rizwan   +3 more
core   +1 more source

Understanding and Overcoming Immunotherapy Resistance in Skin Cancer: Mechanisms and Strategies

open access: yesAging and Cancer, EarlyView.
This narrative review explores the mechanisms driving immunotherapy resistance in skin cancer, including tumor microenvironment factors, genetic mutations, and immune evasion strategies. It highlights potential strategies to overcome resistance, offering insights for improving therapeutic outcomes and guiding future research in personalized ...
Shreya Singh Beniwal   +8 more
wiley   +1 more source

A review of artificial intelligence in brachytherapy

open access: yesJournal of Applied Clinical Medical Physics, EarlyView.
Abstract Artificial intelligence (AI) has the potential to revolutionize brachytherapy's clinical workflow. This review comprehensively examines the application of AI, focusing on machine learning and deep learning, in various aspects of brachytherapy.
Jingchu Chen   +4 more
wiley   +1 more source

Attribute-based multi-user collaborative searchable encryption in COVID-19. [PDF]

open access: yesComput Commun, 2023
Zhao F   +5 more
europepmc   +1 more source

Privacy-preserving efficient searchable encryption [PDF]

open access: yes, 2016
Data storage and computation outsourcing to third-party managed data centers, in environments such as Cloud Computing, is increasingly being adopted by individuals, organizations, and governments.
Ferreira, Bernardo Luís da Silva
core  

Home - About - Disclaimer - Privacy