Results 121 to 130 of about 44,791 (329)

Statistical Analysis of Encryption Quality for Medical Images Based on Rijndael Encryption Algorithm Using Both Static and Chaotic Cipher Key

open access: yesمجله انفورماتیک سلامت و زیست پزشکی, 2014
Introduction: Growing application of medical information systems and various digital communication channels to transfer and share vital and medical information demonstrate the significance of medical data security and privacy policy.
Mohammadreza Naeemabadi   +2 more
doaj  

The dynamics of the CBC Mode of Operation

open access: yes, 2016
In cryptography, the Cipher Block Chaining (CBC), one of the most commonly used mode in recent years, is a mode of operation that uses a block cipher to provide confidentiality or authenticity.
Abidi, Abdessalem   +4 more
core   +1 more source

Tumor mutational burden as a determinant of metastatic dissemination patterns

open access: yesMolecular Oncology, EarlyView.
This study performed a comprehensive analysis of genomic data to elucidate whether metastasis in certain organs share genetic characteristics regardless of cancer type. No robust mutational patterns were identified across different metastatic locations and cancer types.
Eduardo Candeal   +4 more
wiley   +1 more source

TRAIL‐PEG‐Apt‐PLGA nanosystem as an aptamer‐targeted drug delivery system potential for triple‐negative breast cancer therapy using in vivo mouse model

open access: yesMolecular Oncology, EarlyView.
Aptamers are used both therapeutically and as targeting agents in cancer treatment. We developed an aptamer‐targeted PLGA–TRAIL nanosystem that exhibited superior therapeutic efficacy in NOD/SCID breast cancer models. This nanosystem represents a novel biotechnological drug candidate for suppressing resistance development in breast cancer.
Gulen Melike Demirbolat   +8 more
wiley   +1 more source

FPE scheme based on k-splits Feistel network

open access: yesTongxin xuebao, 2012
The construction features and discipline of Feistel network-based FPE(format-preserving encryption)schemes were analyzed.Considering on the problem that 2-splits Feistel networks-based FPE cipher’s block size was in narrow range,a type-2 Feistel network ...
Jing-wei LI   +3 more
doaj   +2 more sources

The PI3Kδ inhibitor roginolisib (IOA‐244) preserves T‐cell function and activity

open access: yesMolecular Oncology, EarlyView.
Identification of novel PI3K inhibitors with limited immune‐related adverse effects is highly sought after. We found that roginolisib and idelalisib inhibit chronic lymphocytic leukemia (CLL) cells and Treg suppressive functions to similar extents, but roginolisib affects cytotoxic T‐cell function and promotion of pro‐inflammatory T helper subsets to a
Elise Solli   +7 more
wiley   +1 more source

GFRX: A New Lightweight Block Cipher for Resource-Constrained IoT Nodes [PDF]

open access: gold, 2023
Xing Zhang   +4 more
openalex   +1 more source

Correlation of the differential expression of PIK3R1 and its spliced variant, p55α, in pan‐cancer

open access: yesMolecular Oncology, EarlyView.
PIK3R1 undergoes alternative splicing to generate the isoforms, p85α and p55α. By combining large patient datasets with laboratory experiments, we show that PIK3R1 spliced variants shape cancer behavior. While tumors lose the protective p85α isoform, p55α is overexpressed, changes linked to poorer survival and more pronounced in African American ...
Ishita Gupta   +10 more
wiley   +1 more source

Efficient Recursive Diffusion Layers for Block Ciphers and Hash Functions [PDF]

open access: bronze, 2013
Mahdi Sajadieh   +3 more
openalex   +1 more source

Circular RNA expression landscapes in myelodysplastic neoplasms: Associations with mutational signatures and disease progression

open access: yesMolecular Oncology, EarlyView.
In this explorative study, the abundance of circular RNA molecules in bone marrow stem cells was found to be elevated in patients with high‐risk myelodysplastic neoplasms, and to be associated with an increased risk of progression to acute myeloid leukemia.
Eileen Wedge   +17 more
wiley   +1 more source

Home - About - Disclaimer - Privacy