Results 41 to 50 of about 122,299 (291)

Secure Internet Voting Protocol (SIVP): A secure option for electoral processes

open access: yesJournal of King Saud University: Computer and Information Sciences, 2022
Colombia government wants to implement electronic voting. However, the existing electronic voting protocols only include some of the required security features and Colombia needs a protocol with all these features to ensure fraud-free elections.
Cristina Satizábal   +2 more
doaj   +1 more source

Genetic attenuation of ALDH1A1 increases metastatic potential and aggressiveness in colorectal cancer

open access: yesMolecular Oncology, EarlyView.
Aldehyde dehydrogenase 1A1 (ALDH1A1) is a cancer stem cell marker in several malignancies. We established a novel epithelial cell line from rectal adenocarcinoma with unique overexpression of this enzyme. Genetic attenuation of ALDH1A1 led to increased invasive capacity and metastatic potential, the inhibition of proliferation activity, and ultimately ...
Martina Poturnajova   +25 more
wiley   +1 more source

A New Cryptosystem Based On Hidden Order Groups [PDF]

open access: yes, 2006
Let $G_1$ be a cyclic multiplicative group of order $n$. It is known that the Diffie-Hellman problem is random self-reducible in $G_1$ with respect to a fixed generator $g$ if $\phi(n)$ is known. That is, given $g, g^x\in G_1$ and having oracle access to
Saxena, Amitabh, Soh, Ben
core   +2 more sources

InShopnito: an advanced yet privacy-friendly mobile shopping application [PDF]

open access: yes, 2014
Mobile Shopping Applications (MSAs) are rapidly gaining popularity. They enhance the shopping experience, by offering customized recommendations or incorporating customer loyalty programs. Although MSAs are quite effective at attracting new customers and
Boukayoua, Faysal   +9 more
core   +2 more sources

RIPK4 function interferes with melanoma cell adhesion and metastasis

open access: yesMolecular Oncology, EarlyView.
RIPK4 promotes melanoma growth and spread. RIPK4 levels increase as skin lesions progress to melanoma. CRISPR/Cas9‐mediated deletion of RIPK4 causes melanoma cells to form less compact spheroids, reduces their migratory and invasive abilities and limits tumour growth and dissemination in mouse models.
Norbert Wronski   +9 more
wiley   +1 more source

Methods for predicting vaccine immunogenicity and reactogenicity

open access: yesHuman Vaccines & Immunotherapeutics, 2020
Subjects receiving the same vaccine often show different levels of immune responses and some may even present adverse side effects to the vaccine. Systems vaccinology can combine omics data and machine learning techniques to obtain highly predictive ...
Patrícia Gonzalez-Dias   +6 more
doaj   +1 more source

Anonymous reputation based reservations in e-commerce (AMNESIC) [PDF]

open access: yes, 2011
Online reservation systems have grown over the last recent years to facilitate the purchase of goods and services. Generally, reservation systems require that customers provide some personal data to make a reservation effective.
Rifà Pous, Helena
core  

qBitcoin: A Peer-to-Peer Quantum Cash System

open access: yes, 2017
A decentralized online quantum cash system, called qBitcoin, is given. We design the system which has great benefits of quantization in the following sense.
A Einstein   +14 more
core   +1 more source

Circulating tumor cell viability during and after radiotherapy mirrors treatment response in cancer patients

open access: yesMolecular Oncology, EarlyView.
Radiotherapy (RT) response depends on the DNA repair capacity of tumor and host cells. We show that circulating tumor cell (CTC) counts and apoptosis rates before and after RT predict treatment response and outcome, which can be accessed via easily accessible liquid biopsy approaches. Created in BioRender. Wikman, H.
Yvonne Goy   +10 more
wiley   +1 more source

The Systematization of Blind Signature Schemes

open access: yesБезопасность информационных технологий, 2015
The paper presents the systematization of existing schemes of blind signatures. The analysis of different types of digital signatures and blind signatures was done, mathematical background of blind signature schemes was examined.
Anna Vasilievna Epishkina   +1 more
doaj  

Home - About - Disclaimer - Privacy