Results 151 to 160 of about 963,035 (329)

QcBits: Constant-Time Small-Key Code-Based Cryptography

open access: yesWorkshop on Cryptographic Hardware and Embedded Systems, 2016
T. Chou
semanticscholar   +1 more source

Peroxidasin enables melanoma immune escape by inhibiting natural killer cell cytotoxicity

open access: yesMolecular Oncology, EarlyView.
Peroxidasin (PXDN) is secreted by melanoma cells and binds the NK cell receptor NKG2D, thereby suppressing NK cell activation and cytotoxicity. PXDN depletion restores NKG2D signaling and enables effective NK cell–mediated melanoma killing. These findings identify PXDN as a previously unrecognized immune evasion factor and a potential target to improve
Hsu‐Min Sung   +17 more
wiley   +1 more source

Survey on cryptanalysis of code-based cryptography: From theoretical to physical attacks

open access: yesInternational Conference on Computer, Control and Communication, 2018
Vlad Drăgoi   +3 more
semanticscholar   +1 more source

Correlation of the differential expression of PIK3R1 and its spliced variant, p55α, in pan‐cancer

open access: yesMolecular Oncology, EarlyView.
PIK3R1 undergoes alternative splicing to generate the isoforms, p85α and p55α. By combining large patient datasets with laboratory experiments, we show that PIK3R1 spliced variants shape cancer behavior. While tumors lose the protective p85α isoform, p55α is overexpressed, changes linked to poorer survival and more pronounced in African American ...
Ishita Gupta   +10 more
wiley   +1 more source

Genetic attenuation of ALDH1A1 increases metastatic potential and aggressiveness in colorectal cancer

open access: yesMolecular Oncology, EarlyView.
Aldehyde dehydrogenase 1A1 (ALDH1A1) is a cancer stem cell marker in several malignancies. We established a novel epithelial cell line from rectal adenocarcinoma with unique overexpression of this enzyme. Genetic attenuation of ALDH1A1 led to increased invasive capacity and metastatic potential, the inhibition of proliferation activity, and ultimately ...
Martina Poturnajova   +25 more
wiley   +1 more source

Code-Based Public-Key Cryptography

open access: yes, 2014
Code-based cryptography is among the most attractive post-quantum cryptographic techniques. It allows the construction of the most important cryptographic primitives (encryption, signature, zero-knowledge, hashing...) often with efficient implementations.
openaire   +1 more source

Targeted modulation of IGFL2‐AS1 reveals its translational potential in cervical adenocarcinoma

open access: yesMolecular Oncology, EarlyView.
Cervical adenocarcinoma patients face worse outcomes than squamous cell carcinoma counterparts despite similar treatment. The identification of IGFL2‐AS1's differential expression provides a molecular basis for distinguishing these histotypes, paving the way for personalized therapies and improved survival in vulnerable populations globally.
Ricardo Cesar Cintra   +6 more
wiley   +1 more source

Rethinking plastic waste: innovations in enzymatic breakdown of oil‐based polyesters and bioplastics

open access: yesFEBS Open Bio, EarlyView.
Plastic pollution remains a critical environmental challenge, and current mechanical and chemical recycling methods are insufficient to achieve a fully circular economy. This review highlights recent breakthroughs in the enzymatic depolymerization of both oil‐derived polyesters and bioplastics, including high‐throughput protein engineering, de novo ...
Elena Rosini   +2 more
wiley   +1 more source

Post-Quantum Cryptography in Satellite Internet: Applications and Reflections

open access: yes天地一体化信息网络
With the ongoing development of quantum computers, the security of satellite Internet faces significant challenges. This paper first introduced the basic concepts of satellite Internet and post-quantum cryptography, thoroughly analyzed the security needs
HUANG Boxue, GU Xin, SHAN Chao, SU An
doaj  

Home - About - Disclaimer - Privacy