Results 101 to 110 of about 235,449 (333)

Cellular liquid biopsy provides unique chances for disease monitoring, preclinical model generation and therapy adjustment in rare salivary gland cancer patients

open access: yesMolecular Oncology, EarlyView.
We quantified and cultured circulating tumor cells (CTCs) of 62 patients with various cancer types and generated CTC‐derived tumoroid models from two salivary gland cancer patients. Cellular liquid biopsy‐derived information enabled molecular genetic assessment of systemic disease heterogeneity and functional testing for therapy selection in both ...
Nataša Stojanović Gužvić   +31 more
wiley   +1 more source

A Secure Authentication Protocol Supporting Efficient Handover for UAV

open access: yesMathematics
Unmanned Aerial Vehicles (UAVs) are increasingly pivotal in operations such as flood rescue, wildfire surveillance, and covert military endeavors, with their integration into the Internet of Things (IoT) networks broadening the scope of services they ...
Kang Wen   +5 more
doaj   +1 more source

New Cryptanalytic Attack on RSA Modulus N = pq Using Small Prime Difference Method

open access: yesCryptography, 2018
This paper presents new short decryption exponent attacks on RSA, which successfully leads to the factorization of RSA modulus N = p q in polynomial time. The paper has two parts.
Muhammad Rezal Kamel Ariffin   +3 more
doaj   +1 more source

Circulating tumor DNA (ctDNA) trajectories predict survival in trifluridine/tipiracil‐treated metastatic colorectal cancer patients

open access: yesMolecular Oncology, EarlyView.
The authors applied joint/mixed models that predict mortality of trifluridine/tipiracil‐treated metastatic colorectal cancer patients based on circulating tumor DNA (ctDNA) trajectories. Patients at high risk of death could be spared aggressive therapy with the prospect of a higher quality of life in their remaining lifetime, whereas patients with a ...
Matthias Unseld   +7 more
wiley   +1 more source

Crosstalk between gut microbiota and tumor: tumors could cause gut dysbiosis and metabolic imbalance

open access: yesMolecular Oncology, EarlyView.
In this research, we analyzed the relationship between gut microbiota and tumor. We discovered that both subcutaneous and metastatic tumors would alter the composition and metabolic function of gut microbiota. Meanwhile, fecal microbiota transplantation also indicated the anti‐tumor role of the gut microbiota, revealing the crosstalk between tumor and ...
Siyuan Zhang   +8 more
wiley   +1 more source

Reversible Data Hiding in Encrypted Images Based on Preprocessing-Free Variable Threshold Secret Sharing

open access: yesApplied Sciences
To solve the limitations of reversible data hiding in encrypted domains (RDH-ED) that cannot be applied to a distributed variable security environment, a novel RDH-ED scheme based on variable threshold image secret sharing (VTSIS) is proposed. Initially,
Chao Jiang   +3 more
doaj   +1 more source

Obesity alters the fitness of peritumoral adipose tissue, exacerbating tumor invasiveness in renal cancer through the induction of ADAM12 and CYP1B1

open access: yesMolecular Oncology, EarlyView.
Tumor microenvironment drives cancer formation and progression. We analyzed the role of human cancer‐associated adipocytes from patients with renal cell carcinoma (RCC) stratified as lean, overweight, or obese. RNA‐seq demonstrated that, among the most altered genes involved in the tumor–stroma crosstalk, are ADAM12 and CYP1B1, which were proven to be ...
Sepehr Torabinejad   +13 more
wiley   +1 more source

Motion vector‐domain video steganalysis exploiting skipped macroblocks

open access: yesIET Image Processing
Video steganography has the potential to be used to convey illegal information, and video steganalysis is a vital tool to detect the presence of this illicit act.
Jun Li   +4 more
doaj   +1 more source

Bootstrapping Optimization Techniques for the FINAL Fully Homomorphic Encryption Scheme

open access: yesInformation
With the advent of cloud computing and the era of big data, there is an increasing focus on privacy computing. Consequently, homomorphic encryption, being a primary technique for achieving privacy computing, is held in high regard.
Meng Wu, Xiufeng Zhao, Weitao Song
doaj   +1 more source

Cryptography: Classical versus Post-Quantum [PDF]

open access: yesarXiv
The advantages of post-quantum cryptography over classical cryptography are covered in this survey. We address several post-quantum cryptography techniques. We conclude that the deployment of quantum-safe cryptographic systems is anticipated to be the future of secure communication, and that the development of post-quantum cryptography is essential to ...
arxiv  

Home - About - Disclaimer - Privacy