Showing 1,461 - 1,480 results of 2,326 for search '"secretion"', query time: 0.04s Refine Results
  1. 1461

    Intestinal Epithelial Cells as a Source of Inflammatory Cytokines and Chemokines by Andrew W Stadnyk

    Published 2002-01-01
    “…In the past decade, the realization emerged that enterocytes secrete molecules (cytokines) that regulate inflammation. …”
    Get full text
    Article
  2. 1462

    An Anonymous Routing Protocol with Authenticated Key Establishment in Wireless Ad Hoc Networks by Wei Yuan

    Published 2014-01-01
    “…Most anonymous routing protocols in ad hoc networks usually assume that a shared secret exists between the sender and the receiver. …”
    Get full text
    Article
  3. 1463

    Systemic Sarcoidosis Unmasked by Cushing’s Disease Surgical Treatment by Daniele Bongetta, Cesare Zoia, Francesco Lombardi, Elisabetta Lovati, Pietro Lucotti, Paolo Gaetani

    Published 2016-01-01
    “…We report a case of sarcoidosis after the resection of an ACTH secreting pituitary adenoma.…”
    Get full text
    Article
  4. 1464

    Access to Network Login by Three-Factor Authentication for Effective Information Security by S. Vaithyasubramanian, A. Christy, D. Saravanan

    Published 2016-01-01
    “…Secret key is assumed an indispensable part in security. …”
    Get full text
    Article
  5. 1465

    « You don’t suspect me of doing anything wrong, do you ? » Peurs, soupçons et paranoïa dans The Woman in White de Wilkie Collins by Laurence Taleirach-Vielmas

    Published 2008-12-01
    “…In The Woman in White, mysterious, secretive and dangerous characters abound, from the ghostly virgin dressed in white who wanders at night and threatens to reveal secrets, to the Italian count and the British baronet who incarcerate the heroine under her half-sister’s name in a lunatic asylum in order to inherit her fortune. …”
    Get full text
    Article
  6. 1466

    2D Sin-Cos-Henon Map for Color Image Encryption with High Security by Zhiqiang Cheng, Wencheng Wang, Yuezhang Dai, Lun Li

    Published 2022-01-01
    “…As the initial value of the 2D-SCH system, the secret key is used to generate chaotic sequences. …”
    Get full text
    Article
  7. 1467

    PATS: Let Parties Have a Say in Threshold Group Key Sharing by Adnan Kılıç, Cansu Betin Onur, Ertan Onur

    Published 2024-01-01
    “…Although PATS resembles threshold secret sharing schemes, it has a different structure. …”
    Get full text
    Article
  8. 1468

    A STEGENOGRAPHY IN 3D MESH BY REARRANGING THE ORDER OF VERTEX PRESENTATION by Thái Duy Quý

    Published 2013-06-01
    “…This paper proposes a method of data hiding approach on 3D mesh objects in the representation domain by rearranging the order of the vertices based on a secret key string (a list vertex that was previously traversed as highly secret). …”
    Get full text
    Article
  9. 1469

    Extracellular vesicles—a new player in the development of urinary bladder cancer by Damian Kasiński, Kamil Szeliski, Tomasz Drewa, Marta Pokrywczyńska

    Published 2025-01-01
    “…Extracellular vesicles (EVs) are nano-sized membranous structures secreted by all types of cells into the extracellular space. …”
    Get full text
    Article
  10. 1470

    Security Analysis of HMAC/NMAC by Using Fault Injection by Kitae Jeong, Yuseop Lee, Jaechul Sung, Seokhie Hong

    Published 2013-01-01
    “…These attacks are applicable to HMAC/NMAC based on the MD-family hash functions and can recover the secret key with the negligible computational complexity. …”
    Get full text
    Article
  11. 1471

    Current Situation of Illegal Usage of Special Expertise while Investigating Thefts by O. V. Haidar

    Published 2021-09-01
    “…The author of the article has studied regulatory legal acts of Ukraine that regulate the usage of special expertise while investigating secret theft of another’s property. The concepts of “an expert”, “a specialist”, “a forensic inspector” have been revealed. …”
    Get full text
    Article
  12. 1472

    Trophic Factors from Tissue Stem Cells for Renal Regeneration by Kenji Tsuji, Shinji Kitamura

    Published 2015-01-01
    “…Taken together from many reports, many secreted factors from stem cells were needed for renal regeneration orchestrally with harmony. …”
    Get full text
    Article
  13. 1473

    A Function Private Attribute-Based Encryption by Fei Han, Jing Qin

    Published 2014-01-01
    “…It guarantees that the secret key reveals nothing to malicious adversary, beyond the unavoidable minimal information such as the length of ciphertext. …”
    Get full text
    Article
  14. 1474

    A novel anti-inflammatory activity of lysozyme: modulation of serum complement activation by M. O. Ogundele

    Published 1998-01-01
    “…Lysozyme is an ubiquitous enzyme found in most biological secretions and leukocytes. This study was aimed at investigating its interaction with other inflammatory mediators on mucosa surfaces, particularly the complement system. …”
    Get full text
    Article
  15. 1475

    The matricellular protein Fibulin-5 regulates β-cell proliferation in an autocrine/paracrine manner by Tomoko Okuyama, Takahiro Tsuno, Ryota Inoue, Setsuko Fukushima, Mayu Kyohara, Anzu Matsumura, Daisuke Miyashita, Kuniyuki Nishiyama, Yusuke Takano, Yu Togashi, Makiko Meguro-Horike, Shin-ichi Horike, Tatsuya Kin, A.M. James Shapiro, Hiromi Yanagisawa, Yasuo Terauchi, Jun Shirakawa

    Published 2025-02-01
    “…Summary: The matricellular protein Fibulin-5 (Fbln5) is a secreted protein that is essential for elastic fiber formation, and pancreatic islets are usually surrounded by the extracellular matrix (ECM), which includes elastic fibers. …”
    Get full text
    Article
  16. 1476

    Related-Key Cryptanalysis on the Full PRINTcipher Suitable for IC-Printing by Yuseop Lee, Kitae Jeong, Changhoon Lee, Jaechul Sung, Seokhie Hong

    Published 2014-01-01
    “…PRINTcipher-48/96 are 48/96-bit block ciphers proposed in CHES 2010 which support the 80/160-bit secret keys, respectively. In this paper, we propose related-key cryptanalysis of PRINTcipher. …”
    Get full text
    Article
  17. 1477

    Mifepristone Accelerates HPA Axis Recovery in Secondary Adrenal Insufficiency by Pejman Cohan

    Published 2016-01-01
    “…Transient secondary adrenal insufficiency (SAI) is an expected complication following successful adenomectomy of ACTH-secreting pituitary adenomas or unilateral adrenalectomy for cortisol-secreting adrenal adenomas. …”
    Get full text
    Article
  18. 1478

    Impact of Candida Species on Clinical Outcomes in Patients with Suspected Ventilator-Associated Pneumonia by Marie-Soleil Delisle, David R Williamson, Martin Albert, Marc M Perreault, Xuran Jiang, Andrew G Day, Daren K Heyland

    Published 2011-01-01
    “…BACKGROUND: The significance of Candida species in respiratory tract (RT) secretions in critically ill patients is unclear.…”
    Get full text
    Article
  19. 1479

    Preliminary study on antimicrobial activities of skin mucus from by-catch of Elasmobranch species by Aydoğdu Elif Özlem Arslan, Kesiktaş Mert, Sanli Nazmiye Ozlem, Güngör Nihal Doğruöz, Sancar Serap, Yildiz Taner, Yemişken Emre

    Published 2023-06-01
    “…Mouse fibroblast cell viability was challenged with mucus secretions. M. aquila and R. clavata mucus secretions exhibited no observable change after 24 and 48 hours. …”
    Get full text
    Article
  20. 1480

    Devil’s Vortex Phase Structure as Frequency Plane Mask for Image Encryption Using the Fractional Mellin Transform by Sunanda Vashisth, Hukum Singh, A. K. Yadav, Kehar Singh

    Published 2014-01-01
    “…The proposed scheme has been validated for grayscale secret target images, by numerical simulation. The efficacy of the scheme has been evaluated by computing mean-squared-error between the secret target image and the decrypted image. …”
    Get full text
    Article