Results 151 to 160 of about 235,449 (333)

Adverse prognosis gene expression patterns in metastatic castration‐resistant prostate cancer

open access: yesMolecular Oncology, EarlyView.
We aggregated a cohort of 1012 mCRPC tissue samples from 769 patients and investigated the association of gene expression‐based pathways with clinical outcomes. Loss of AR signaling, high proliferation, and a glycolytic phenotype were independently prognostic for poor outcomes, and an adverse transcriptional feature score incorporating these pathways ...
Marina N. Sharifi   +26 more
wiley   +1 more source

Authentication using cryptography

open access: yesInformation Security Technical Report, 1997
Abstract The purpose of this paper is to describe the nature of user authentication and entity authentication based on the use of cryptographic methods. The relationship between key distribution and entity authentication is described, and examples of practical authentication protocols are given, together with some of the pitfalls awaiting designers ...
openaire   +10 more sources

Systematic generation of cryptographically robust S-boxes [PDF]

open access: bronze, 1993
Jennifer Seberry   +2 more
openalex   +1 more source

Transcriptome‐wide analysis of circRNA and RBP profiles and their molecular relevance for GBM

open access: yesMolecular Oncology, EarlyView.
CircRNAs are differentially expressed in glioblastoma primary tumors and might serve as therapeutic targets and diagnostic markers. The investigation of circRNA and RNA‐binding proteins (RBPs) interactions shows that distinct RBPs play a role in circRNA biogenesis and function.
Julia Latowska‐Łysiak   +14 more
wiley   +1 more source

Confusion and Diffusion Techniques for Image Encryption Process Based on Chaos System

open access: yesJurnal Nasional Teknik Elektro dan Teknologi Informasi
Face recognition uses biometric technologies to identify humans based on their facial characteristics. This method is commonly used to restrict information access control. The benefits of face recognition systems encompass their ease of use and security.
Magfirawaty Magfirawaty   +3 more
doaj   +1 more source

Elucidating prognostic significance of purine metabolism in colorectal cancer through integrating data from transcriptomic, immunohistochemical, and single‐cell RNA sequencing analysis

open access: yesMolecular Oncology, EarlyView.
Low expression of five purine metabolism‐related genes (ADSL, APRT, ADCY3, NME3, NME6) was correlated with poor survival in colorectal cancer. Immunohistochemistry analysis showed that low NME3 (early stage) and low ADSL/NME6 (late stage) levels were associated with high risk.
Sungyeon Kim   +8 more
wiley   +1 more source

Software-Defined Cryptography: A Design Feature of Cryptographic Agility [PDF]

open access: yesarXiv
Given the widespread use of cryptography in Enterprise IT, migration to post-quantum cryptography (PQC) is not drop-in replacement at all. Cryptographic agility, or crypto-agility, is a design feature that enables seamless updates to new cryptographic algorithms and standards without the need to modify or replace the surrounding infrastructure.
arxiv  

Galois rings and algebraic cryptography [PDF]

open access: bronze, 1991
Javier Gomez-Calderon, Gary L. Mullen
openalex   +1 more source

Exploration of heterogeneity and recurrence signatures in hepatocellular carcinoma

open access: yesMolecular Oncology, EarlyView.
This study leveraged public datasets and integrative bioinformatic analysis to dissect malignant cell heterogeneity between relapsed and primary HCC, focusing on intercellular communication, differentiation status, metabolic activity, and transcriptomic profiles.
Wen‐Jing Wu   +15 more
wiley   +1 more source

Home - About - Disclaimer - Privacy