We generated and characterized clear cell renal cell carcinoma models using the patient‐derived RCC243 cell line—including cell culture, orthotopic, and metastatic tumors—via single‐cell RNA‐sequencing for comparisons between models and patient tumor datasets.
Richard Huang+9 more
wiley +1 more source
Quantum-resilient software security: A fuzzy AHP-based assessment framework in the era of quantum computing. [PDF]
Almotiri SH.
europepmc +1 more source
A Calculus for Cryptographic Protocols: The Spi Calculus
Martı́n Abadi, Andrew D. Gordon
openalex +1 more source
Liver‐specific knockout of N6‐methyladenosine (m6A) methyltransferase METTL3 significantly accelerated hepatic tumor initiation under various oncogenic challenges, contrary to the previously reported oncogenic role of METTL3 in liver cancer cell lines or xenograft models. Mechanistically, METTL3 deficiency reduced m6A deposition on Manf transcripts and
Bo Cui+15 more
wiley +1 more source
Separable reversible data hiding by vacating room after encryption using encrypted pixel difference. [PDF]
Venkatesh V+4 more
europepmc +1 more source
Possible role of human ribonuclease dicer in the regulation of R loops
R loops play an important role in regulating key cellular processes such as replication, transcription, centromere stabilization, or control of telomere length. However, the unscheduled accumulation of R loops can cause many diseases, including cancer, and neurodegenerative or inflammatory disorders. Interestingly, accumulating data indicate a possible
Klaudia Wojcik+2 more
wiley +1 more source
Secure and Reliable Fog-Enabled Architecture Using Blockchain With Functional Biased Elliptic Curve Cryptography Algorithm for Healthcare Services. [PDF]
Awasthi C, Awasthi SP, Mishra PK.
europepmc +1 more source
Comparative study of adenosine 3′‐pyrophosphokinase domains of MuF polymorphic toxins
With the ultimate goal of understanding the association of toxin‐immunity modules to temperate phages, we characterized toxins from three prophages and examined cross‐protection from immunity proteins. The toxins exhibit adenosine 3′‐pyrophosphokinase activity and are toxic in Escherichia coli.
Eloïse M. Paulet+6 more
wiley +1 more source
DNA-Inspired Lightweight Cryptographic Algorithm for Secure and Efficient Image Encryption. [PDF]
Abdelaal MA+5 more
europepmc +1 more source
Erratum: Codes of steiner triple and quadruple systems designs, codes and cryptography, 3, 117?125 (1993) [PDF]
openalex +1 more source