![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Sharding Technologies in Blockchain: Basics, State of the Art, and Challenges
Sharding is one of the key technologies of blockchain scalable characteristics widely used in cryptocurrencies, Internet of Things, supply chain management and other fields. It can achieve high performance sca...
-
Chapter and Conference Paper
Secure Traffic Data Sharing in UAV-Assisted VANETs
Aiming at the issues of low comprehensiveness and timeliness of data, difficulty in balancing data anonymity and traceability, and challenges of securely storing massive data in traditional traffic data sharin...
-
Chapter and Conference Paper
A Lightweight PUF-Based Group Authentication Scheme for Privacy-Preserving Metering Data Collection in Smart Grid
With the development of information and communication technologies, the services provided by smart grid attract more users to join smart grid. However, with the explosive growth of the number of smart meters, ...
-
Chapter and Conference Paper
Efficient and Revocable Anonymous Account Guarantee System Based on Blockchain
The fast expansion of information technology and public concern for personal privacy and security have raised expectations for the authentication process. Although existing anonymous authentication schemes can...
-
Chapter and Conference Paper
Privacy-Preserving Blockchain Supervision with Responsibility Tracking
Blockchain technology is a strategic technology to support the development of digital economy, which helps to promote data sharing, improve the efficiency of communication and build a trusted system. With the ...
-
Article
Open AccessA phosphoinositide switch mediates exocyst recruitment to multivesicular endosomes for exosome secretion
Exosomes are secreted to the extracellular milieu when multivesicular endosomes (MVEs) dock and fuse with the plasma membrane. However, MVEs are also known to fuse with lysosomes for degradation. How MVEs are ...
-
Chapter and Conference Paper
IoT-Assisted Blockchain-Based Car Rental System Supporting Traceability
The majority of existing car rental systems rely on a centralized database to manage the data. Although these centralized architectures could make the system design and operation costs are reduced, there are m...
-
Article
Open AccessFeedback between mechanosensitive signaling and active forces governs endothelial junction integrity
The formation and recovery of gaps in the vascular endothelium governs a wide range of physiological and pathological phenomena, from angiogenesis to tumor cell extravasation. However, the interplay between th...
-
Article
Open AccessActin polymerization promotes invagination of flat clathrin-coated lattices in mammalian cells by pushing at lattice edges
Clathrin-mediated endocytosis (CME) requires energy input from actin polymerization in mechanically challenging conditions. The roles of actin in CME are poorly understood due to inadequate knowledge of actin ...
-
Article
Open AccessHRS phosphorylation drives immunosuppressive exosome secretion and restricts CD8+ T-cell infiltration into tumors
The lack of tumor infiltration by CD8+ T cells is associated with poor patient response to anti-PD-1 therapy. Understanding how tumor infiltration is regulated is key to improving treatment efficacy. Here, we rep...
-
Article
Efficient data transfer supporting provable data deletion for secure cloud storage
With the widespread popularity of cloud storage, a growing quantity of tenants prefer to upload their massive data to remote cloud data center for saving local cost. Due to the great market prospect, a large q...
-
Chapter and Conference Paper
Study on Path Planning of Multi-storey Parking Lot Based on Combined Loss Function
Path planning research can effectively solve the problem of finding free parking space in multi-storey parking lots. This paper takes advantage of the decision ability of reinforcement learning and the percept...
-
Chapter and Conference Paper
An Illegal Data Supervision Scheme for the Consortium Blockchain
With the rapid development of blockchain, many enterprise-level applications have used consortium blockchain to ensure the system’s immutability and decentralization. However, due to the immutability of blockc...
-
Article
Open AccessT-Plastin reinforces membrane protrusions to bridge matrix gaps during cell migration
Migrating cells move across diverse assemblies of extracellular matrix (ECM) that can be separated by micron-scale gaps. For membranes to protrude and reattach across a gap, actin filaments, which are relative...
-
Article
Dynamin regulates the dynamics and mechanical strength of the actin cytoskeleton as a multifilament actin-bundling protein
The dynamin GTPase is known to bundle actin filaments, but the underlying molecular mechanism and physiological relevance remain unclear. Our genetic analyses revealed a function of dynamin in propelling invas...
-
Chapter and Conference Paper
Data Integrity Checking Supporting Reliable Data Migration in Cloud Storage
With the rapid development of cloud computing, more and more users are willing to employ cloud storage. As a result, an increasing number of companies invest cloud storage thus provide users with data storage ...
-
Chapter and Conference Paper
New Publicly Verifiable Cloud Data Deletion Scheme with Efficient Tracking
Cloud storage service, one of the most important services in the cloud computing, can offer high-quality storage service for tenants. By employing the cloud storage service, the resource-constraint data owners...
-
Article
Ultrastructure and dynamics of the actin−myosin II cytoskeleton during mitochondrial fission
Mitochondrial fission involves the preconstriction of an organelle followed by scission by dynamin-related protein Drp1. Preconstriction is facilitated by actin and non-muscle myosin II through a mechanism tha...
-
Chapter and Conference Paper
A New Outsourced Data Deletion Scheme with Public Verifiability
In the cloud storage, the data owner will lose the direct control over his outsourced data, and all the operations over the outsourced data may be executed by corresponding remote cloud server, such as cloud d...
-
Article
Open AccessGraph database-based network security situation awareness data storage method
With the rapid development of the Internet, network security situation awareness has attracted tremendous attention. In large-scale complex networks, network security situation awareness data presents the char...