Results 121 to 130 of about 2,429,355 (361)
The A3 adenosine receptors (A3ARs) are overexpressed in prostate cancer. AR 292 and AR 357, as A3AR antagonists, are capable of blocking proliferation, modulating the expression of drug transporter genes involved in chemoresistance, ferroptosis, and the hypoxia response, and inducing cell death.
Maria Beatrice Morelli+15 more
wiley +1 more source
Application of keyword searchable encryption in cloud
Recently,some schemes combined keyword searchable encryption with attribute based encryption,solved access control problem in cloud environment,but they didn’t consider security problems like keyword guessing attack and security channels,so they couldn’t
Peng LIN, Jie JIANG, Tie-ming CHEN
doaj +2 more sources
The Locality of Searchable Symmetric Encryption [PDF]
This paper proves a lower bound on the trade-off between server storage size and the locality of memory accesses in searchable symmetric encryption (SSE). Namely, when encrypting an index of N identifier/keyword pairs, the encrypted index must have size ω(N) or the scheme must perform searching with ω(1) non-contiguous reads to memory or the scheme ...
David Cash, Stefano Tessaro
openaire +1 more source
ZNF469 regulates the expression of genes encoding extracellular matrix proteins. Endogenous ZNF469 is predominantly cytoplasmic, while in transfected cells, it forms aggregates reminiscent of biomolecular condensates, located mainly in the nucleus. These condensates exhibit overlapping staining with proteasomes and are also associated with the mitotic ...
Anne Elisabeth Christensen Mellgren+8 more
wiley +1 more source
Forward Secure Conjunctive-Keyword Searchable Encryption
Searchable symmetric encryption (SSE) has been applied in constructing secure cloud storage for its simplicity, high-efficiency, and practicality. Recent works show that forward privacy has become a fundamental property required for SSE, and several ...
Chengyu Hu+6 more
doaj +1 more source
ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments [PDF]
The enforcement of security policies in outsourced environments is still an open challenge for policy-based systems. On the one hand, taking the appropriate security decision requires access to the policies.
Asghar, Muhammad Rizwan+3 more
core +1 more source
Understanding and Overcoming Immunotherapy Resistance in Skin Cancer: Mechanisms and Strategies
This narrative review explores the mechanisms driving immunotherapy resistance in skin cancer, including tumor microenvironment factors, genetic mutations, and immune evasion strategies. It highlights potential strategies to overcome resistance, offering insights for improving therapeutic outcomes and guiding future research in personalized ...
Shreya Singh Beniwal+8 more
wiley +1 more source
A review of artificial intelligence in brachytherapy
Abstract Artificial intelligence (AI) has the potential to revolutionize brachytherapy's clinical workflow. This review comprehensively examines the application of AI, focusing on machine learning and deep learning, in various aspects of brachytherapy.
Jingchu Chen+4 more
wiley +1 more source
Attribute-based multi-user collaborative searchable encryption in COVID-19. [PDF]
Zhao F+5 more
europepmc +1 more source
Privacy-preserving efficient searchable encryption [PDF]
Data storage and computation outsourcing to third-party managed data centers, in environments such as Cloud Computing, is increasingly being adopted by individuals, organizations, and governments.
Ferreira, Bernardo Luís da Silva
core