Results 31 to 40 of about 599,267 (255)

Detection of circulating tumor DNA in colorectal cancer patients using a methylation‐specific droplet digital PCR multiplex

open access: yesMolecular Oncology, EarlyView.
We developed a cost‐effective methylation‐specific droplet digital PCR multiplex assay containing tissue‐conserved and tumor‐specific methylation markers. The assay can detect circulating tumor DNA with high accuracy in patients with localized and metastatic colorectal cancer.
Luisa Matos do Canto   +8 more
wiley   +1 more source

A Ring-LWE-based digital signature inspired by Lindner–Peikert scheme

open access: yesJournal of Mathematical Cryptology, 2022
In this article, we give a digital signature by using Lindner–Peikert cryptosystem. The security of this digital signature is based on the assumptions about hardness of Ring-LWE and Ring-SIS problems, along with providing public key and signature of ...
Sharafi Javad, Daghigh Hassan
doaj   +1 more source

Key Substitution in the Symbolic Analysis of Cryptographic Protocols (extended version) [PDF]

open access: yes, 2007
Key substitution vulnerable signature schemes are signature schemes that permit an intruder, given a public verification key and a signed message, to compute a pair of signature and verification keys such that the message appears to be signed with the ...
Chevalier, Yannick, Kourjieh, Mounira
core   +2 more sources

Experimental measurement-device-independent quantum digital signatures over a metropolitan network [PDF]

open access: yes, 2017
Quantum digital signatures (QDS) provide a means for signing electronic communications with informationtheoretic security. However, all previous demonstrations of quantum digital signatures assume trusted measurement devices. This renders them vulnerable
Andersson, Erika   +18 more
core   +2 more sources

Transcriptional network analysis of PTEN‐protein‐deficient prostate tumors reveals robust stromal reprogramming and signs of senescent paracrine communication

open access: yesMolecular Oncology, EarlyView.
Combining PTEN protein assessment and transcriptomic profiling of prostate tumors, we uncovered a network enriched in senescence and extracellular matrix (ECM) programs associated with PTEN loss and conserved in a mouse model. We show that PTEN‐deficient cells trigger paracrine remodeling of the surrounding stroma and this information could help ...
Ivana Rondon‐Lorefice   +16 more
wiley   +1 more source

Advances in Digital Signature Algorithms: Performance, Security and Future Prospects [PDF]

open access: yesITM Web of Conferences
With the rise of online transactions and digital communications, digital signatures have become essential for verifying document integrity and authenticity across fields like finance, government, and healthcare.
Lyu Shuhan
doaj   +1 more source

A Study on the Interoperability Technology of Digital Identification Based on WACI Protocol with Multiparty Distributed Signature

open access: yesSensors, 2023
In digital identity authentication, credentials are typically stored in a digital wallet and authenticated through a single key-based signature and public key verification.
Jihwan Kim   +3 more
doaj   +1 more source

Effective therapeutic targeting of CTNNB1‐mutant hepatoblastoma with WNTinib

open access: yesMolecular Oncology, EarlyView.
WNTinib, a Wnt/CTNNB1 inhibitor, was tested in hepatoblastoma (HB) experimental models. It delayed tumor growth and improved survival in CTNNB1‐mutant in vivo models. In organoids, WNTinib outperformed cisplatin and showed enhanced efficacy in combination therapy, supporting its potential as a targeted treatment for CTNNB1‐mutated HB.
Ugne Balaseviciute   +17 more
wiley   +1 more source

ANALYSIS OF DIGITAL SIGNATURE RULE IN THE ELECTRONIC COMMERCE LAW OF INDONESIA

open access: yesMimbar Hukum, 2015
The Indonesian legislature has enacted the Information and Electronic Transaction Bill (the Bill) in 2003, in which digital signature as a technology specific electronic (e) commerce has been promoted.
Irna Nurhayati
doaj  

Data integrity and security of digital signatures on electronic systems using the digital signature algorithm (DSA)

open access: yesInternational Journal of Electronics and Communications System, 2021
The digital signature generation process begins with the creation of a public key and a private key. A public key is generated and published to verify the signature and calculate the hash value of the received document.
Asep Saepulrohman, Agus Ismangil
doaj   +1 more source

Home - About - Disclaimer - Privacy