Results 51 to 60 of about 2,775,007 (306)
Tau acetylation at K331 has limited impact on tau pathology in vivo
We mapped tau post‐translational modifications in humanized MAPT knock‐in mice and in amyloid‐bearing double knock‐in mice. Acetylation within the repeat domain, particularly around K331, showed modest increases under amyloid pathology. To test functional relevance, we generated MAPTK331Q knock‐in mice.
Shoko Hashimoto +3 more
wiley +1 more source
ROSE: Robust Searchable Encryption With Forward and Backward Security
Dynamic searchable symmetric encryption (DSSE) has been widely recognized as a promising technique to delegate update and search queries over an outsourced database to an untrusted server while guaranteeing the privacy of data.
Peng Xu +6 more
semanticscholar +1 more source
Searchable Encryption In Cloud Storage
{"references": ["D. Song, D. Wagner, and A. Perrig, \"Practical Techniques for Searches on Encrypted Data,\" in Proceedings of IEEE Symposium on Security and Privacy'00, 2000, pp. 44-55.", "E.-J. Goh, \"Secure Indexes,\" Cryptology ePrint Archive, 2003, [Online]. Available: http://eprint.iacr.org/2003/216.", "Y.-C. Chang and M.
Hwang, Ren Junn +2 more
openaire +1 more source
The noncoding region of the genome plays a key role in regulating gene expression, and mutations within these regions are capable of altering it. Researchers have identified multiple functional noncoding mutations associated with increased cancer risk in the genome of breast cancer patients.
Arnau Cuy Saqués +3 more
wiley +1 more source
Multi-User Searchable Encryption Scheme for IoT Scenarios Based on Bloom Filter [PDF]
Searchable encryption technology utilizes extracted keywords as indexes to search for specific documents within a document collection. However, existing searchable encryption schemes suffer from the issues of significantly increased resource consumption ...
YI Qiuzhi, TANG Hongbo, QIU Hang
doaj +1 more source
Cloud data warehouse (CDW) platforms have been offered by many cloud service providers to provide abundant storage and unlimited accessibility service to business users.
S. Fugkeaw, Lyhour Hak, T. Theeramunkong
semanticscholar +1 more source
Substring-Searchable Symmetric Encryption [PDF]
Abstract In this paper, we consider a setting where a client wants to outsource storage of a large amount of private data and then perform substring search queries on the data – given a data string s and a search string p, find all occurrences of p as a substring of s.
Melissa Chase, Emily Shen
openaire +1 more source
Plecstatin inhibits hepatocellular carcinoma tumorigenesis and invasion through cytolinker plectin
The ruthenium‐based metallodrug plecstatin exerts its anticancer effect in hepatocellular carcinoma (HCC) primarily through selective targeting of plectin. By disrupting plectin‐mediated cytoskeletal organization, plecstatin inhibits anchorage‐dependent growth, cell polarization, and tumor cell dissemination.
Zuzana Outla +10 more
wiley +1 more source
Attribute-Based Searchable Encryption: A Survey
With the advent of the big data era, the size and complexity of data continue to increase, which makes the requirement for data privacy and security increasingly urgent.
Li Yan +7 more
semanticscholar +1 more source
We show that the majority of the 18 analyzed recurrent cancer‐associated ERBB4 mutations are transforming. The most potent mutations are activating, co‐operate with other ERBB receptors, and are sensitive to pan‐ERBB inhibitors. Activating ERBB4 mutations also promote therapy resistance in EGFR‐mutant lung cancer.
Veera K. Ojala +15 more
wiley +1 more source

