Results 91 to 100 of about 618,431 (354)
On Authentication, Digital Signatures and Signature Laws [PDF]
The public debate arising from the introduction of signature laws in North America, Europe and elsewhere has prompted this paper. This paper analyses and compares the closely interrelated concepts of authentication, digital signatures and electronic signature laws and tries to explain and resolve some of the ambiguities. Non-trivial problems and issues
openaire +1 more source
We identified adaptor protein ShcD as upregulated in triple‐negative breast cancer and found its expression to be correlated with reduced patient survival and increased invasion in cell models. Using a proteomic screen, we identified novel ShcD binding partners involved in EGFR signaling pathways.
Hayley R. Lau+11 more
wiley +1 more source
Dual targeting of AKT and mTOR using MK2206 and RAD001 reduces tumor burden in an intracardiac colon cancer circulating tumor cell xenotransplantation model. Analysis of AKT isoform‐specific knockdowns in CTC‐MCC‐41 reveals differentially regulated proteins and phospho‐proteins by liquid chromatography coupled mass spectrometry. Circulating tumor cells
Daniel J. Smit+19 more
wiley +1 more source
An Introduction to Digital Signature Schemes [PDF]
Today, all types of digital signature schemes emphasis on secure and best verification methods. Different digital signature schemes are used in order for the websites, security organizations, banks and so on to verify user's validity. Digital signature schemes are categorized to several types such as proxy, on-time, batch and so on.
arxiv
An Elliptic Curve-based Signcryption Scheme with Forward Secrecy
An elliptic curve-based signcryption scheme is introduced in this paper that effectively combines the functionalities of digital signature and encryption, and decreases the computational costs and communication overheads in comparison with the ...
Ali Asghar Beheshti S+2 more
core +2 more sources
Osimertinib reduces angiogenesis and PDL1 expression in in ovo tumors, transforming them into ‘cold tumors’ with lower immune activity. Anatomopathological and transcriptomic analyses highlight its therapeutic impact on tumor biology. This study underscores osimertinib's potential to reshape the tumor microenvironment and provides insights into its ...
David Barthélémy+14 more
wiley +1 more source
Development of 4T1 breast cancer mouse model system for preclinical carbonic anhydrase IX studies
Carbonic anhydrase IX (CAIX) is a well‐recognised therapeutic target and prognostic biomarker in cancer. We developed and characterised a robust murine breast cancer model system that is suitable for CAIX studies in vitro and in vivo—it comprises both CAIX‐positive and CAIX‐negative controls and provides a solid platform for the comprehensive ...
Zane Kalniņa+13 more
wiley +1 more source
Study on elliptic curve public key cryptosystems with application of pseudorandom number generator. [PDF]
by Yuen Ching Wah.Thesis (M.Phil.)--Chinese University of Hong Kong, 1998.Includes bibliographical references (leaves 61-[63]).Abstract also in Chinese.Chapter 1 --- Introduction --- p.1Chapter 1.1 --- Why use cryptography?
core
Abstract Purpose Due to the tight curvature in their design, ring applicators are usually associated with large positioning errors. The standard practice to correct for these deviations based on global offsets may not be sufficient to comply with the recommended tolerance.
Leon G. Aldrovandi+3 more
wiley +1 more source
Digital Signature menggunakan Elliptic curve digital signature algorithm(ECDSA) dan Rindael Algorithm untuk security pada MMS
(Elliptic Curce Digital Signature Algorithm (ECDSA) and Rijndael Algorithm Implementation for MMS Security) [PDF]
ABSTRAKSI: MMS (Multimedia Messaging Service) adalah layanan komunikasi messaging yang telah ditetapkan standarnya oleh WAP dan 3GPP. Dalam MMS keamanan seakan menjadi suatu yang sangat penting seiring dengan perkembangan dalam hal teknologi ini.
Irvan Armando
core