Results 51 to 60 of about 2,775,007 (306)

Tau acetylation at K331 has limited impact on tau pathology in vivo

open access: yesFEBS Letters, EarlyView.
We mapped tau post‐translational modifications in humanized MAPT knock‐in mice and in amyloid‐bearing double knock‐in mice. Acetylation within the repeat domain, particularly around K331, showed modest increases under amyloid pathology. To test functional relevance, we generated MAPTK331Q knock‐in mice.
Shoko Hashimoto   +3 more
wiley   +1 more source

ROSE: Robust Searchable Encryption With Forward and Backward Security

open access: yesIEEE Transactions on Information Forensics and Security, 2022
Dynamic searchable symmetric encryption (DSSE) has been widely recognized as a promising technique to delegate update and search queries over an outsourced database to an untrusted server while guaranteeing the privacy of data.
Peng Xu   +6 more
semanticscholar   +1 more source

Searchable Encryption In Cloud Storage

open access: yes, 2014
{"references": ["D. Song, D. Wagner, and A. Perrig, \"Practical Techniques for Searches on Encrypted Data,\" in Proceedings of IEEE Symposium on Security and Privacy'00, 2000, pp. 44-55.", "E.-J. Goh, \"Secure Indexes,\" Cryptology ePrint Archive, 2003, [Online]. Available: http://eprint.iacr.org/2003/216.", "Y.-C. Chang and M.
Hwang, Ren Junn   +2 more
openaire   +1 more source

Cis‐regulatory and long noncoding RNA alterations in breast cancer – current insights, biomarker utility, and the critical need for functional validation

open access: yesMolecular Oncology, EarlyView.
The noncoding region of the genome plays a key role in regulating gene expression, and mutations within these regions are capable of altering it. Researchers have identified multiple functional noncoding mutations associated with increased cancer risk in the genome of breast cancer patients.
Arnau Cuy Saqués   +3 more
wiley   +1 more source

Multi-User Searchable Encryption Scheme for IoT Scenarios Based on Bloom Filter [PDF]

open access: yesJisuanji gongcheng
Searchable encryption technology utilizes extracted keywords as indexes to search for specific documents within a document collection. However, existing searchable encryption schemes suffer from the issues of significantly increased resource consumption ...
YI Qiuzhi, TANG Hongbo, QIU Hang
doaj   +1 more source

Achieving Secure, Verifiable, and Efficient Boolean Keyword Searchable Encryption for Cloud Data Warehouse

open access: yesIEEE Access
Cloud data warehouse (CDW) platforms have been offered by many cloud service providers to provide abundant storage and unlimited accessibility service to business users.
S. Fugkeaw, Lyhour Hak, T. Theeramunkong
semanticscholar   +1 more source

Substring-Searchable Symmetric Encryption [PDF]

open access: yesProceedings on Privacy Enhancing Technologies, 2015
Abstract In this paper, we consider a setting where a client wants to outsource storage of a large amount of private data and then perform substring search queries on the data – given a data string s and a search string p, find all occurrences of p as a substring of s.
Melissa Chase, Emily Shen
openaire   +1 more source

Plecstatin inhibits hepatocellular carcinoma tumorigenesis and invasion through cytolinker plectin

open access: yesMolecular Oncology, EarlyView.
The ruthenium‐based metallodrug plecstatin exerts its anticancer effect in hepatocellular carcinoma (HCC) primarily through selective targeting of plectin. By disrupting plectin‐mediated cytoskeletal organization, plecstatin inhibits anchorage‐dependent growth, cell polarization, and tumor cell dissemination.
Zuzana Outla   +10 more
wiley   +1 more source

Attribute-Based Searchable Encryption: A Survey

open access: yesElectronics
With the advent of the big data era, the size and complexity of data continue to increase, which makes the requirement for data privacy and security increasingly urgent.
Li Yan   +7 more
semanticscholar   +1 more source

Recurrent cancer‐associated ERBB4 mutations are transforming and confer resistance to targeted therapies

open access: yesMolecular Oncology, EarlyView.
We show that the majority of the 18 analyzed recurrent cancer‐associated ERBB4 mutations are transforming. The most potent mutations are activating, co‐operate with other ERBB receptors, and are sensitive to pan‐ERBB inhibitors. Activating ERBB4 mutations also promote therapy resistance in EGFR‐mutant lung cancer.
Veera K. Ojala   +15 more
wiley   +1 more source

Home - About - Disclaimer - Privacy