Results 121 to 130 of about 87,772 (336)

Execution Integrity with In-Place Encryption

open access: yes, 2017
Instruction set randomization (ISR) was initially proposed with the main goal of countering code-injection attacks. However, ISR seems to have lost its appeal since code-injection attacks became less attractive because protection mechanisms such as data ...
Arias, Orlando   +5 more
core  

The block cipher Square [PDF]

open access: bronze, 1997
Joan Daemen   +2 more
openalex   +1 more source

Multidimensional OMICs reveal ARID1A orchestrated control of DNA damage, splicing, and cell cycle in normal‐like and malignant urothelial cells

open access: yesMolecular Oncology, EarlyView.
Loss of the frequently mutated chromatin remodeler ARID1A, a subunit of the SWI/SNF cBAF complex, results in less open chromatin, alternative splicing, and the failure to stop cells from progressing through the cell cycle after DNA damage in bladder (cancer) cells. Created in BioRender. Epigenetic regulators, such as the SWI/SNF complex, with important
Rebecca M. Schlösser   +11 more
wiley   +1 more source

A Complex Transformation of Monoalphabetic Cipher to Polyalphabetic Cipher: (Vigenère-Affine Cipher) [PDF]

open access: yesInternational Journal of Machine Learning and Computing, 2019
Tun Myat Aung   +2 more
openaire   +2 more sources

ShcD adaptor protein drives invasion of triple negative breast cancer cells by aberrant activation of EGFR signaling

open access: yesMolecular Oncology, EarlyView.
We identified adaptor protein ShcD as upregulated in triple‐negative breast cancer and found its expression to be correlated with reduced patient survival and increased invasion in cell models. Using a proteomic screen, we identified novel ShcD binding partners involved in EGFR signaling pathways.
Hayley R. Lau   +11 more
wiley   +1 more source

Enciphering on the basis of the sums with products of weight and free components as summands

open access: yesVestnik Samarskogo Gosudarstvennogo Tehničeskogo Universiteta. Seriâ: Fiziko-Matematičeskie Nauki, 2012
The purpose of the given paper is reviewing of mathematical resources of enciphering of the source text, allowing to ensure the simplicity of appropriate decryption; the source text is a sequence of integer weight coefficients. The composer of the cipher
Alexander I Nikonov
doaj  

Multi‐omic characterization of consensus molecular subtype 1 (CMS1) colorectal cancer with dampened immune response improves precision medicine

open access: yesMolecular Oncology, EarlyView.
This study highlights the importance of multi‐omic analyses in characterizing colorectal cancers. Indeed, our analysis revealed a rare CMS1 exhibiting dampened immune activation, including reduced PD‐1 expression, moderate CD8+ T‐cell infiltration, and suppressed JAK/STAT pathway.
Livia Concetti   +10 more
wiley   +1 more source

IMPLEMENTASI ALGORITMA SUPER ENKRIPSI VIGENERE CIPHER DAN ROUTE CIPHER PADA PENYANDIAN PESAN TEKS

open access: yesJurnal Matematika UNAND
Kemajuan teknologi diiringi dengan meningkatnya ancaman terhadap keamanan serta kerahasiaan informasi pada pesan. Salah satu cara untuk mengamankan pesan dapat menggunakan teknik super enkripsi.
SUSILA BAHRI   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy