Results 101 to 110 of about 201,296 (311)

Escape from TGF‐β‐induced senescence promotes aggressive hallmarks in epithelial hepatocellular carcinoma cells

open access: yesMolecular Oncology, EarlyView.
Chronic TGF‐β exposure drives epithelial HCC cells from a senescent state to a TGF‐β resistant mesenchymal phenotype. This transition is characterized by the loss of Smad3‐mediated signaling, escape from senescence, enhanced invasiveness and metastatic potential, and upregulation of key resistance modulators such as MARK1 and GRM8, ultimately promoting
Minenur Kalyoncu   +11 more
wiley   +1 more source

Cryptography and Encryption

open access: yes, 2005
In cryptography, encryption is the process of obscuring information to make it unreadable without special knowledge. This is usually done for secrecy, and typically for confidential communications.
Litke, Andreas, Zotos, Kostas
core  

Kleptography: Using Cryptography Against Cryptography [PDF]

open access: yes, 1997
The notion of a Secretly Embedded Trapdoor with Universal Protection (SETUP) has been recently introduced. In this paper we extend the study of stealing information securely and subliminally from black-box cryptosystems. The SETUP mechanisms presented here, in contrast with previous ones, leak secret key information without using an explicit subliminal
Adam Young, Moti Yung
openaire   +1 more source

ShcD adaptor protein drives invasion of triple negative breast cancer cells by aberrant activation of EGFR signaling

open access: yesMolecular Oncology, EarlyView.
We identified adaptor protein ShcD as upregulated in triple‐negative breast cancer and found its expression to be correlated with reduced patient survival and increased invasion in cell models. Using a proteomic screen, we identified novel ShcD binding partners involved in EGFR signaling pathways.
Hayley R. Lau   +11 more
wiley   +1 more source

Reversible Data Hiding in Encrypted Images Based on Preprocessing-Free Variable Threshold Secret Sharing

open access: yesApplied Sciences
To solve the limitations of reversible data hiding in encrypted domains (RDH-ED) that cannot be applied to a distributed variable security environment, a novel RDH-ED scheme based on variable threshold image secret sharing (VTSIS) is proposed. Initially,
Chao Jiang   +3 more
doaj   +1 more source

Multi‐omic characterization of consensus molecular subtype 1 (CMS1) colorectal cancer with dampened immune response improves precision medicine

open access: yesMolecular Oncology, EarlyView.
This study highlights the importance of multi‐omic analyses in characterizing colorectal cancers. Indeed, our analysis revealed a rare CMS1 exhibiting dampened immune activation, including reduced PD‐1 expression, moderate CD8+ T‐cell infiltration, and suppressed JAK/STAT pathway.
Livia Concetti   +10 more
wiley   +1 more source

Motion vector‐domain video steganalysis exploiting skipped macroblocks

open access: yesIET Image Processing
Video steganography has the potential to be used to convey illegal information, and video steganalysis is a vital tool to detect the presence of this illicit act.
Jun Li   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy