Results 141 to 150 of about 2,386,676 (394)

The accumulation of myeloid‐derived suppressor cells participates in abdominal infection‐induced tumor progression through the PD‐L1/PD‐1 axis

open access: yesMolecular Oncology, EarlyView.
This study explores how sepsis affects GC progression by creating an immunosuppressive environment. Our findings reveal that sepsis promotes immune dysregulation, enhancing tumor growth and metastasis. Targeting the PD‐1/PD‐L1 pathway with monoclonal antibodies shows potential for restoring immune function and improving outcomes in cancer patients ...
Yiding Wang   +10 more
wiley   +1 more source

Proposed A Permutation and Substitution Methods of Serpent Block Cipher

open access: yesIbn Al-Haitham Journal for Pure and Applied Sciences, 2019
     Block cipher technique is one of cryptography techniques to encrypt data block by block. The Serpent is one of AES candidates. It encrypts a 128-bit block by using 32 rounds of a similar calculation utilizing permutations and substitutions.
Intisar Abid Yousif
doaj   +1 more source

The dynamics of the CBC Mode of Operation

open access: yes, 2016
In cryptography, the Cipher Block Chaining (CBC), one of the most commonly used mode in recent years, is a mode of operation that uses a block cipher to provide confidentiality or authenticity.
Abidi, Abdessalem   +4 more
core   +1 more source

The PTTG1/VASP axis promotes oral squamous cell carcinoma metastasis by modulating focal adhesion and actin filaments

open access: yesMolecular Oncology, EarlyView.
VASP was found to be overexpressed in metastatic oral squamous cell carcinoma (OSCC) tissues. Notably, PTTG1‐ and VASP‐deficient OSCC cells demonstrated suppressed metastatic properties by disrupting the interaction between the cytoskeleton and focal adhesion (FAs) in the filopodia region.
Suyeon Park   +6 more
wiley   +1 more source

Statistical Analysis of Encryption Quality for Medical Images Based on Rijndael Encryption Algorithm Using Both Static and Chaotic Cipher Key

open access: yesمجله انفورماتیک سلامت و زیست پزشکی, 2014
Introduction: Growing application of medical information systems and various digital communication channels to transfer and share vital and medical information demonstrate the significance of medical data security and privacy policy.
Mohammadreza Naeemabadi   +2 more
doaj  

SOSEMANUK: a fast software-oriented stream cipher [PDF]

open access: yesNew Stream Cipher Designs - The eSTREAM finalists (2008) 98-118, 2008
Sosemanuk is a new synchronous software-oriented stream cipher, corresponding to Profile 1 of the ECRYPT call for stream cipher primitives. Its key length is variable between 128 and 256 bits. It ac- commodates a 128-bit initial value. Any key length is claimed to achieve 128-bit security.
arxiv  

Physical attacks on block ciphers [PDF]

open access: yes, 2019
The security of a cryptosystem is often compromised, not from a theoretical point of view, but by the leakage caused by the physical implementation of the cryptographic algorithm. A new class of attacks, called physical attacks, has shown the capability to exploit the unintentional physical behaviors from the cryptographic device, which usually provide
openaire   +4 more sources

NanoCMSer: a consensus molecular subtype stratification tool for fresh‐frozen and paraffin‐embedded colorectal cancer samples

open access: yesMolecular Oncology, EarlyView.
Consensus molecular subtypes (CMS1‐4) have been identified to study colorectal cancer heterogeneity and serve as potential biomarkers. In this study, we developed and evaluated NanoCMSer, a NanoString‐based classifier using 55 genes, optimized for FF and FFPE to facilitate the clinical evaluation of CMS subtyping.
Arezo Torang   +10 more
wiley   +1 more source

FPE scheme based on k-splits Feistel network

open access: yesTongxin xuebao, 2012
The construction features and discipline of Feistel network-based FPE(format-preserving encryption)schemes were analyzed.Considering on the problem that 2-splits Feistel networks-based FPE cipher’s block size was in narrow range,a type-2 Feistel network ...
Jing-wei LI   +3 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy