Suggested Topics within your search.
Suggested Topics within your search.
- Equity 2
- History 2
- Trusts and trustees 2
- ART / Digital 1
- Archaeological expeditions 1
- Archeology 1
- Collection and preservation 1
- Computer animation 1
- Crimes against 1
- Desertions 1
- Design 1
- Digital cinematography 1
- Dinosaurs 1
- Discovery 1
- Employees 1
- Examinations, questions, etc 1
- FICTION 1
- FICTION / Psychological 1
- FICTION / Thrillers 1
- Fathers and daughters 1
- Fossils 1
- Historical 1
- Intelligence service 1
- Internet advertising 1
- Internet marketing 1
- Law 1
- Miscellanea 1
- Orthopedics 1
- Paleontologists 1
- Pediatric 1
-
1461
Intestinal Epithelial Cells as a Source of Inflammatory Cytokines and Chemokines
Published 2002-01-01“…In the past decade, the realization emerged that enterocytes secrete molecules (cytokines) that regulate inflammation. …”
Get full text
Article -
1462
An Anonymous Routing Protocol with Authenticated Key Establishment in Wireless Ad Hoc Networks
Published 2014-01-01“…Most anonymous routing protocols in ad hoc networks usually assume that a shared secret exists between the sender and the receiver. …”
Get full text
Article -
1463
Systemic Sarcoidosis Unmasked by Cushing’s Disease Surgical Treatment
Published 2016-01-01“…We report a case of sarcoidosis after the resection of an ACTH secreting pituitary adenoma.…”
Get full text
Article -
1464
Access to Network Login by Three-Factor Authentication for Effective Information Security
Published 2016-01-01“…Secret key is assumed an indispensable part in security. …”
Get full text
Article -
1465
« You don’t suspect me of doing anything wrong, do you ? » Peurs, soupçons et paranoïa dans The Woman in White de Wilkie Collins
Published 2008-12-01“…In The Woman in White, mysterious, secretive and dangerous characters abound, from the ghostly virgin dressed in white who wanders at night and threatens to reveal secrets, to the Italian count and the British baronet who incarcerate the heroine under her half-sister’s name in a lunatic asylum in order to inherit her fortune. …”
Get full text
Article -
1466
2D Sin-Cos-Henon Map for Color Image Encryption with High Security
Published 2022-01-01“…As the initial value of the 2D-SCH system, the secret key is used to generate chaotic sequences. …”
Get full text
Article -
1467
PATS: Let Parties Have a Say in Threshold Group Key Sharing
Published 2024-01-01“…Although PATS resembles threshold secret sharing schemes, it has a different structure. …”
Get full text
Article -
1468
A STEGENOGRAPHY IN 3D MESH BY REARRANGING THE ORDER OF VERTEX PRESENTATION
Published 2013-06-01“…This paper proposes a method of data hiding approach on 3D mesh objects in the representation domain by rearranging the order of the vertices based on a secret key string (a list vertex that was previously traversed as highly secret). …”
Get full text
Article -
1469
Extracellular vesicles—a new player in the development of urinary bladder cancer
Published 2025-01-01“…Extracellular vesicles (EVs) are nano-sized membranous structures secreted by all types of cells into the extracellular space. …”
Get full text
Article -
1470
Security Analysis of HMAC/NMAC by Using Fault Injection
Published 2013-01-01“…These attacks are applicable to HMAC/NMAC based on the MD-family hash functions and can recover the secret key with the negligible computational complexity. …”
Get full text
Article -
1471
Current Situation of Illegal Usage of Special Expertise while Investigating Thefts
Published 2021-09-01“…The author of the article has studied regulatory legal acts of Ukraine that regulate the usage of special expertise while investigating secret theft of another’s property. The concepts of “an expert”, “a specialist”, “a forensic inspector” have been revealed. …”
Get full text
Article -
1472
Trophic Factors from Tissue Stem Cells for Renal Regeneration
Published 2015-01-01“…Taken together from many reports, many secreted factors from stem cells were needed for renal regeneration orchestrally with harmony. …”
Get full text
Article -
1473
A Function Private Attribute-Based Encryption
Published 2014-01-01“…It guarantees that the secret key reveals nothing to malicious adversary, beyond the unavoidable minimal information such as the length of ciphertext. …”
Get full text
Article -
1474
A novel anti-inflammatory activity of lysozyme: modulation of serum complement activation
Published 1998-01-01“…Lysozyme is an ubiquitous enzyme found in most biological secretions and leukocytes. This study was aimed at investigating its interaction with other inflammatory mediators on mucosa surfaces, particularly the complement system. …”
Get full text
Article -
1475
The matricellular protein Fibulin-5 regulates β-cell proliferation in an autocrine/paracrine manner
Published 2025-02-01“…Summary: The matricellular protein Fibulin-5 (Fbln5) is a secreted protein that is essential for elastic fiber formation, and pancreatic islets are usually surrounded by the extracellular matrix (ECM), which includes elastic fibers. …”
Get full text
Article -
1476
Related-Key Cryptanalysis on the Full PRINTcipher Suitable for IC-Printing
Published 2014-01-01“…PRINTcipher-48/96 are 48/96-bit block ciphers proposed in CHES 2010 which support the 80/160-bit secret keys, respectively. In this paper, we propose related-key cryptanalysis of PRINTcipher. …”
Get full text
Article -
1477
Mifepristone Accelerates HPA Axis Recovery in Secondary Adrenal Insufficiency
Published 2016-01-01“…Transient secondary adrenal insufficiency (SAI) is an expected complication following successful adenomectomy of ACTH-secreting pituitary adenomas or unilateral adrenalectomy for cortisol-secreting adrenal adenomas. …”
Get full text
Article -
1478
Impact of Candida Species on Clinical Outcomes in Patients with Suspected Ventilator-Associated Pneumonia
Published 2011-01-01“…BACKGROUND: The significance of Candida species in respiratory tract (RT) secretions in critically ill patients is unclear.…”
Get full text
Article -
1479
Preliminary study on antimicrobial activities of skin mucus from by-catch of Elasmobranch species
Published 2023-06-01“…Mouse fibroblast cell viability was challenged with mucus secretions. M. aquila and R. clavata mucus secretions exhibited no observable change after 24 and 48 hours. …”
Get full text
Article -
1480
Devil’s Vortex Phase Structure as Frequency Plane Mask for Image Encryption Using the Fractional Mellin Transform
Published 2014-01-01“…The proposed scheme has been validated for grayscale secret target images, by numerical simulation. The efficacy of the scheme has been evaluated by computing mean-squared-error between the secret target image and the decrypted image. …”
Get full text
Article