Results 111 to 120 of about 235,449 (333)

Trusted Certificates in Quantum Cryptography [PDF]

open access: yesarXiv, 2006
This paper analyzes the performance of Kak's three stage quantum cryptographic protocol based on public key cryptography against a man-in-the-middle attack. A method for protecting against such an attack is presented using certificates distributed by a trusted third party.
arxiv  

Addressing persistent challenges in digital image analysis of cancer tissue: resources developed from a hackathon

open access: yesMolecular Oncology, EarlyView.
Large multidimensional digital images of cancer tissue are becoming prolific, but many challenges exist to automatically extract relevant information from them using computational tools. We describe publicly available resources that have been developed jointly by expert and non‐expert computational biologists working together during a virtual hackathon
Sandhya Prabhakaran   +16 more
wiley   +1 more source

Innovative field of cryptography: DNA cryptography [PDF]

open access: yesComputer Science & Information Technology(CS&IT), 2012
DNA cryptography is a new instinctive cryptographic field emerged with the research of DNA computing, in which DNA is used as information shipper and the modern biological technology is used as accomplishment tool. The speculative study and implementation shows method to be efficient in computation, storage and transmission and it is very powerful ...
openaire   +1 more source

Implementing the Three-Stage Quantum Cryptography Protocol [PDF]

open access: yesarXiv, 2006
We present simple implementations of Kak's three-stage quantum cryptography protocol. The case where the transformation is applied to more than one qubit at the same time is also considered.
arxiv  

Detection rate for ESR1 mutations is higher in circulating‐tumor‐cell‐derived genomic DNA than in paired plasma cell‐free DNA samples as revealed by ddPCR

open access: yesMolecular Oncology, EarlyView.
Analysis of ESR1 mutations in plasma cell‐free DNA (cfDNA) is highly important for the selection of treatment in patients with breast cancer. Using multiplex‐ddPCR and identical blood draws, we investigated whether circulating tumor cells (CTCs) and cfDNA provide similar or complementary information for ESR1 mutations.
Stavroula Smilkou   +11 more
wiley   +1 more source

Full Restoration of Visual Encrypted Color Images [PDF]

open access: yesarXiv, 2011
While strictly black and white images have been the basis for visual cryptography, there has been a lack of an easily implemented format for colour images. This paper establishes a simple, yet secure way of implementing visual cryptography with colour, assuming a binary data representation.
arxiv  

Targeted metabolomics reveals novel diagnostic biomarkers for colorectal cancer

open access: yesMolecular Oncology, EarlyView.
This study employed targeted metabolomic profiling to identify 302 distinct metabolites present in platelet‐rich plasma (PRP), revealing aberrant metabolic profiles amongst individuals diagnosed with colorectal cancer (CRC). Compared to carcinoembryonic antigen (CEA) and cancer antigen 19‐9 (CA199), our metabolite panel showed improved sensitivity ...
Zuojian Hu   +7 more
wiley   +1 more source

Home - About - Disclaimer - Privacy