Results 101 to 110 of about 201,296 (311)
Advanced cryptographic techniques for computer [PDF]
Dennie Van Tassel
openalex +1 more source
Chronic TGF‐β exposure drives epithelial HCC cells from a senescent state to a TGF‐β resistant mesenchymal phenotype. This transition is characterized by the loss of Smad3‐mediated signaling, escape from senescence, enhanced invasiveness and metastatic potential, and upregulation of key resistance modulators such as MARK1 and GRM8, ultimately promoting
Minenur Kalyoncu+11 more
wiley +1 more source
In cryptography, encryption is the process of obscuring information to make it unreadable without special knowledge. This is usually done for secrecy, and typically for confidential communications.
Litke, Andreas, Zotos, Kostas
core
An extension of the Shannon theory approach to cryptography [PDF]
Martin E. Hellman
openalex +1 more source
Kleptography: Using Cryptography Against Cryptography [PDF]
The notion of a Secretly Embedded Trapdoor with Universal Protection (SETUP) has been recently introduced. In this paper we extend the study of stealing information securely and subliminally from black-box cryptosystems. The SETUP mechanisms presented here, in contrast with previous ones, leak secret key information without using an explicit subliminal
Adam Young, Moti Yung
openaire +1 more source
We identified adaptor protein ShcD as upregulated in triple‐negative breast cancer and found its expression to be correlated with reduced patient survival and increased invasion in cell models. Using a proteomic screen, we identified novel ShcD binding partners involved in EGFR signaling pathways.
Hayley R. Lau+11 more
wiley +1 more source
To solve the limitations of reversible data hiding in encrypted domains (RDH-ED) that cannot be applied to a distributed variable security environment, a novel RDH-ED scheme based on variable threshold image secret sharing (VTSIS) is proposed. Initially,
Chao Jiang+3 more
doaj +1 more source
Cryptographic sealing for information secrecy and authentication [PDF]
David K. Gifford
openalex +1 more source
This study highlights the importance of multi‐omic analyses in characterizing colorectal cancers. Indeed, our analysis revealed a rare CMS1 exhibiting dampened immune activation, including reduced PD‐1 expression, moderate CD8+ T‐cell infiltration, and suppressed JAK/STAT pathway.
Livia Concetti+10 more
wiley +1 more source
Motion vector‐domain video steganalysis exploiting skipped macroblocks
Video steganography has the potential to be used to convey illegal information, and video steganalysis is a vital tool to detect the presence of this illicit act.
Jun Li+4 more
doaj +1 more source