Results 61 to 70 of about 175,312 (289)

Secure Transmission in Cognitive Wiretap Networks with Full-Duplex Receivers

open access: yesApplied Sciences, 2020
This paper studies the secure transmission in the dual-hop cognitive wiretap networks, where the secondary transmitter (Alice) aims to transmit confidential information to the secondary receiver (Bob) in the face of a multi-antenna relay (Relay), while ...
Zhihui Shang   +6 more
doaj   +1 more source

Review of "History on the Run: Secrecy, Fugitivity, and Hmong Refugee Epistemologies" by Ma Vang (Duke University Press)

open access: yesLateral, 2022
In "History on the Run: Secrecy, Fugitivity, and Hmong Refugee Epistemologies," Ma Vang deftly answers the question of how one can “recount a history that has systematically been kept secret” by centering Hmong refugees as sources of knowledge and ...
Aline Lo
doaj   +1 more source

Pengaturan Rahasia Bank (Bank Secrecy) di Indonesia (Studi Perbandingan Bank Secrecy di Thailand)

open access: yesJurnal Hukum PRIORIS, 2016
Bank adalah badan usaha yang menghimpun dana dari masyarakat dalam bentuk simpanan dan menyalurkannya kepada masyarakat dalam bentuk kredit dan atau bentuk-bentuk lainnya dalam rangka meningkatkan taraf hidup rakyat banyak. Bank sebagai lembaga perantara keuangan, harus menjaga kepercayaan masyarakat yang telah diberikan kepadanya dengan menjamin ...
openaire   +1 more source

Role-Playing Game for Studying User Behaviors in Security: A Case Study on Email Secrecy [PDF]

open access: yesProceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, 2014
Understanding the capabilities of adversaries (e.g., how much the adversary knows about a target) is important for building strong security defenses. Computing an adversary's knowledge about a target requires new modeling techniques and experimental methods.
Kui Xu   +4 more
openaire   +1 more source

Crucial parameters for precise copy number variation detection in formalin‐fixed paraffin‐embedded solid cancer samples

open access: yesMolecular Oncology, EarlyView.
This study shows that copy number variations (CNVs) can be reliably detected in formalin‐fixed paraffin‐embedded (FFPE) solid cancer samples using ultra‐low‐pass whole‐genome sequencing, provided that key (pre)‐analytical parameters are optimized.
Hanne Goris   +10 more
wiley   +1 more source

“I Am Afraid of Telling You This, Lest You’d Be Scared Shitless!”: The Myth of Secrecy and the Study of the Esoteric Traditions of Bengal

open access: yesReligions, 2018
As the verse chosen as a title for this article emblematically shows, esoteric movements have consistently used secrecy as a literary topos in their oral and written cultural expressions for a number of purposes.
Carola Erika Lorea
doaj   +1 more source

KLK7 overexpression promotes an aggressive phenotype and facilitates peritoneal dissemination in colorectal cancer cells

open access: yesFEBS Open Bio, EarlyView.
KLK7, a tissue kallikrein‐related peptidase, is elevated in advanced colorectal cancer and associated with shorter survival. High KLK7 levels in ascites correlate with peritoneal metastasis. In mice, KLK7 overexpression increases metastasis. In vitro, KLK7 enhances cancer cell proliferation, migration, adhesion, and spheroid formation, driving ...
Yosr Z. Haffani   +6 more
wiley   +1 more source

The Rhetorical Algorithm: WikiLeaks and the Elliptical Secrets of Donald J. Trump

open access: yesSecrecy and Society, 2018
Algorithms were a generative force behind many of the leaks and secrets that dominated the 2016 election season. Taking the form of the identity-anonymizing Tor software that protected the identity of leakers, mathematical protocols occupied a prominent ...
Atilla Hallsby
doaj  

Enhancing Secrecy Performance for NOMA Systems With Intelligent Reflecting Surface: Analysis and Optimization

open access: yesIEEE Access, 2021
This paper studies the effectiveness of intelligent reflecting surface (IRS) in enabling robust secure communications for indoor non-orthogonal multiple access (NOMA) systems. Using an IRS-control and power-allocation (PA) strategy (IRSCaPAS), the system
Van Phu Tuan, Ic-Pyo Hong
doaj   +1 more source

Digital twins to accelerate target identification and drug development for immune‐mediated disorders

open access: yesFEBS Open Bio, EarlyView.
Digital twins integrate patient‐derived molecular and clinical data into personalised computational models that simulate disease mechanisms. They enable rapid identification and validation of therapeutic targets, prediction of drug responses, and prioritisation of candidate interventions.
Anna Niarakis, Philippe Moingeon
wiley   +1 more source

Home - About - Disclaimer - Privacy