-
161
Association of Peripheral Monocyte Count with Soluble P-Selectin and Advanced Stages in Nasopharyngeal Carcinoma
Published 2018-01-01“…Monocyte count was correlated with sP-selectin especially in high monocyte count subgroup.…”
Get full text
Article -
162
Effect of cyclosporin A on inflammatory cytokine production by U937 monocyte-like cells
Published 2000-01-01“…The present study was undertaken to determine the effect of CsA on inflammatory cytokine secretion by U937 monocyte cells. Undifferentiated and dimethylsulfoxide (DMSO) differentiated U937 cells were incubated with different concentrations of CsA (200, 20 and 2 ng/mL) in the presence or absence of phorbol-myristateacetate (PMA). …”
Get full text
Article -
163
The Role of the Monocyte-to-Lymphocyte Ratio in Acute Ischemic Stroke Patients with Acute Kidney Injury
Published 2022-01-01“…The objective of the study was to determine if acute kidney injury (AKI) in patients with acute ischemic stroke was associated with the monocyte-to-lymphocyte ratio (MLR) assessed upon admission to the neurology intensive care unit (NICU) (AIS). …”
Get full text
Article -
164
Representation of medieval climate fluctuations in Central Asia in the toponymic system: Historical and geographical data
Published 2025-02-01Subjects: Get full text
Article -
165
Monocyte STAT1 phosphorylation and treatment response of JAK inhibitors in chronic nonbacterial osteomyelitis
Published 2025-01-01“…Notably, pSTAT1 levels in CNO monocytes fluctuated with disease activity, decreasing in 5 patients during clinical remission following conventional therapies (p = 0.016). …”
Get full text
Article -
166
Olopatadine Suppresses the Migration of THP-1 Monocytes Induced by S100A12 Protein
Published 2006-01-01“…Pretreatment of olopatadine with S100A12 reduced migration of THP-1, a monocyte cell line, induced by S100A12 alone, but did not affect recombinant human regulated upon activation, normal T cell expressed and secreted (RANTES)-induced migration. …”
Get full text
Article -
167
Text coverless information hiding method based on synonyms expansion and label delivery mechanism
Published 2021-09-01Subjects: Get full text
Article -
168
-
169
Changes in T-Cell and Monocyte Phenotypes In Vitro by Schistosoma mansoni Antigens in Cutaneous Leishmaniasis Patients
Published 2012-01-01“…In the current study we evaluated whether S. mansoni antigens alter monocyte and T-lymphocyte phenotypes in leishmaniasis. …”
Get full text
Article -
170
Fluid flow impacts endothelial-monocyte interactions in a model of vascular inflammatory fibrosis
Published 2025-01-01Subjects: Get full text
Article -
171
-
172
Evaluation of Monomer Releasing from Dentin Replacement Materials
Published 2024-01-01“…The aim of this study is to determine and quantify the monomer elution from four different resin-based composite dentin replacement materials for 3 months using HPLC. …”
Get full text
Article -
173
Secure password-based authentication scheme with anonymous identity without smart cards
Published 2008-01-01“…Rhee-Kwon-Lee’s password-based scheme without using smart cards is vulnerable to insider attack,password can’t be changed freely,and its computational cost is high.In order to fix all these security flaws,a new password-based authentication scheme with anonymous identity without using smart cards was presented.The security and computational efficiency of our scheme were improved by confusing the anonymous identity with user’s password and taking use of the timestamp.According to comparisons with other password authentication schemes without smart cards,our scheme not only fixes weaknesses of Rhee-Kwon-Lee’s scheme,but also satisfies all the security requirements for ideal password authentication without smart cards and is the better one in security performance and computational cost.…”
Get full text
Article -
174
Anonymous Authentication Scheme Based on Physically Unclonable Function and Biometrics for Smart Cities
Published 2025-01-01Subjects: “…anonymity…”
Get full text
Article -
175
An Anonymous Routing Protocol with Authenticated Key Establishment in Wireless Ad Hoc Networks
Published 2014-01-01“…Anonymity is an important concern in wireless communications. …”
Get full text
Article -
176
Verifiably secure fast group authentication protocol with anonymous traceability for Internet of vehicles
Published 2021-06-01Subjects: Get full text
Article -
177
An Anonymous Authentication Scheme in VANETs of Smart City Based on Certificateless Group Signature
Published 2020-01-01“…With the change of the network communication environment in vehicular ad hoc networks (VANETs) of a smart city, vehicles may encounter security threats such as eavesdropping, positioning, and tracking, so appropriate anonymity protection is required. Based on the certificateless cryptosystem and group signature ideas, this paper proposes a certificateless group signature anonymous authentication scheme for the VANETs of a smart city. …”
Get full text
Article -
178
Blockchain-based cross-data center anonymous and verifiable identity authentication scheme
Published 2024-04-01“…In practical application scenarios, it is essential to not only protect the privacy of user identities but also to effectively regulate anonymous identities. An anonymous and supervisable cross-data center identity authentication scheme based on blockchain was proposed. …”
Get full text
Article -
179
k-times attribute-based authentication scheme using direct anonymous attestation
Published 2018-12-01Subjects: Get full text
Article -
180
Anonymity handover authentication protocol based on group signature for wireless Mesh network
Published 2016-10-01“…In order to ensure that the Mesh network mobile client video,voice and other real-time strong applications without interruption,a secure and efficient handover authentication was very important.To protect the privacy of mobile nodes,an anonymity handover authentication protocol was proposed based on group signature for wireless mesh network.Compared with other handover authentication protocols based on group signature,the proposed scheme did not involve the group signature correlation operation,and the group signature algorithm was only carried out on the router.The pro-posed protocol not only enhances the security but also performs well in authentication efficiency and privacy-preserving.…”
Get full text
Article