-
241
Effects of Low-Level Laser Therapy on M1-Related Cytokine Expression in Monocytes via Histone Modification
Published 2014-01-01Get full text
Article -
242
Role of CC chemokine CCL6/C10 as a monocyte chemoattractant in a murine acute peritonitis
Published 2004-01-01Subjects: Get full text
Article -
243
Insulin Resistance, Inflammation, and Obesity: Role of Monocyte Chemoattractant Protein-1 (orCCL2) in the Regulation of Metabolism
Published 2010-01-01“…We have reviewed the evidence showing that monocyte chemoattractant protein-1 (MCP-1 or CCL2) may have a systemic role in the regulation of metabolism that sometimes is not necessarily linked to the traffic of inflammatory cells to susceptible tissues. …”
Get full text
Article -
244
Acute stimulation of PBMCs drives switch from dopamine-induced anti- to proinflammatory phenotype of monocytes only in women
Published 2025-02-01Subjects: Get full text
Article -
245
Monocyte‐predominant engraftment, cytokine levels and early transplant‐related complications in pediatric hematopoietic stem cell recipients
Published 2019-03-01Subjects: Get full text
Article -
246
Anonymous Authentication and Key Agreement Scheme Combining the Group Key for Vehicular Ad Hoc Networks
Published 2021-01-01“…The most basic method of VANET privacy protection is anonymous authentication. Even through, there are many existing schemes to provide anonymous authentication for VANETs. …”
Get full text
Article -
247
Ring-based efficient batch authentication and group key agreement protocol with anonymity in Internet of vehicles
Published 2023-06-01“…Aiming at the problem that the current batch authentication and key agreement protocol were relied on semi-trusted road side unit (RSU) and were not suitable for key update in large-scale Internet of vehicles (IoV), a ring-based efficient batch authentication and group key agreement protocol with anonymity in IoV was proposed.The anonymity was ensured by the pseudonym mechanism.The authentication key pairs were constructed by the chaotic map, and the batch authentication for many vehicles was quickly completed by a small number of bilinear maps.The joining and leaving of vehicles in large-scale IoV scenario were fully considered, a ring session group was efficiently constructed by using the semi-group property of chaotic maps, and a group key establishment and update mechanism suitable for large-scale vehicles was designed.In addition, a pseudonym update mechanism and an anonymous tracing mechanism were designed to ensure a more secure session process.At the same time, the BAN logic model was used to prove the semantic security of the protocol.The security analysis and simulation results show that the proposed protocol has multiple security attributes and certain efficiency advantages.…”
Get full text
Article -
248
Location privacy protection method based on lightweight K-anonymity incremental nearest neighbor algorithm
Published 2023-06-01Subjects: Get full text
Article -
249
Anonymous security authentication scheme using elliptic curve cryptography and hash function in mobile network
Published 2016-05-01Subjects: Get full text
Article -
250
Anonymizing region construction scheme based on query range in location-based service privacy protection
Published 2017-09-01Subjects: Get full text
Article -
251
A ZigBee network anonymous authentication scheme based on Chebyshev chaotic mapping and CRT
Published 2023-12-01Subjects: Get full text
Article -
252
Toward Privacy Preservation Using Clustering Based Anonymization: Recent Advances and Future Research Outlook
Published 2022-01-01Subjects: Get full text
Article -
253
Security Evaluation of Provably Secure ECC-Based Anonymous Authentication and Key Agreement Scheme for IoT
Published 2025-01-01“…The previous work in “Provably Secure ECC-Based Anonymous Authentication and Key Agreement for IoT” proposed a novel AKA scheme for secure IoT environments. …”
Get full text
Article -
254
Data Verification of Logical Pk-Anonymization with Big Data Application and Key Generation in Cloud Computing
Published 2022-01-01“…More secure than K-Anonymization, Pk-Anonymization is the area’s first randomization method. …”
Get full text
Article -
255
An Anonymous User Authentication with Key Agreement Scheme without Pairings for Multiserver Architecture Using SCPKs
Published 2013-01-01“…In this paper, we present an anonymous remote user authentication with key agreement scheme for multi-server architecture employing self-certified public keys without pairings. …”
Get full text
Article -
256
La mémoire de la Grande Guerre à travers les odonymes en France
Published 2024-03-01“…But the number of odonyms who commemorates the second world war, or other conflicts, is more important. …”
Get full text
Article -
257
Hybrid k-anonymity approach based on TDS and BUG under the environment of big data cloud
Published 2016-07-01Subjects: Get full text
Article -
258
-
259
Corpus based study of verbs explain and clarify as an example of assistance in pedagogical settings
Published 2020-12-01Subjects: “…synonym…”
Get full text
Article -
260
Taxonomic notes on the genus Spinosodus Breuning & de Jong, 1941 (Coleoptera, Cerambycidae) with a generic and specific synonym
Published 2025-01-01“…The genus Bulbolmotega Breuning, 1966 is synonymized with Spinosodus, and Bulbolmotega sumatrensis Breuning, 1966 is recognized as a junior synonym of Spinosodus spinicollis Breuning & de Jong, 1941. …”
Get full text
Article