Results 71 to 80 of about 133,439 (330)
We identified adaptor protein ShcD as upregulated in triple‐negative breast cancer and found its expression to be correlated with reduced patient survival and increased invasion in cell models. Using a proteomic screen, we identified novel ShcD binding partners involved in EGFR signaling pathways.
Hayley R. Lau+11 more
wiley +1 more source
Digital Signature Schemes with Complementary Functionality and Applications
Digital signature schemes with additional functionality (an undeniable signature, a signature of the designated confirmee, a signature blind, a group signature, a signature of the additional protection) and examples of their application are considered ...
S. N. Kyazhin
doaj
Quotable Signatures for Authenticating Shared Quotes [PDF]
Quotable signature schemes are digital signature schemes with the additional property that from the signature for a message, any party can extract signatures for (allowable) quotes from the message, without knowing the secret key or interacting with the signer of the original message.
arxiv
Dual targeting of AKT and mTOR using MK2206 and RAD001 reduces tumor burden in an intracardiac colon cancer circulating tumor cell xenotransplantation model. Analysis of AKT isoform‐specific knockdowns in CTC‐MCC‐41 reveals differentially regulated proteins and phospho‐proteins by liquid chromatography coupled mass spectrometry. Circulating tumor cells
Daniel J. Smit+19 more
wiley +1 more source
Osimertinib reduces angiogenesis and PDL1 expression in in ovo tumors, transforming them into ‘cold tumors’ with lower immune activity. Anatomopathological and transcriptomic analyses highlight its therapeutic impact on tumor biology. This study underscores osimertinib's potential to reshape the tumor microenvironment and provides insights into its ...
David Barthélémy+14 more
wiley +1 more source
Cryptanalysis and improvement of several certificateless digital signature schemes
The security flaws of the certificateless digital signature schemes proposed by Liu-Au-Susilo (2007),Goranlta-Saxena (2005),Cao-Paterson-Kou(2006),Yap-Heng-Goi(2006) and Je Hong Park(2006)were analyzed.
WANG Hua-qun1+2 more
doaj +2 more sources
On the Classification of Proxy Digital Signature Schemes
We provide a classification of proxy digital signature schemes based on common classification of digital signature schemes of Z. Cao, which is modified according to new functionality requirements of the schemes.
A. A. Varfolomeev
doaj
Quantum digital signature scheme [PDF]
Digital signatures are the building blocks of modern communication to prevent masquerading by any party other than recipients, repudiation by signatory and forgery by any individual recipient. Digital signature scheme is said to be standard if the signature (a) is a pattern depending upon the message to be signed, (b) is built upon some information ...
arxiv
Abstract Purpose Due to the tight curvature in their design, ring applicators are usually associated with large positioning errors. The standard practice to correct for these deviations based on global offsets may not be sufficient to comply with the recommended tolerance.
Leon G. Aldrovandi+3 more
wiley +1 more source
Signcryption scheme based on schnorr digital signature [PDF]
This article presents a new signcryption scheme which is based on the Schnorr digital signature algorithm. The new scheme represents my personal contribution to signcryption area. I have been implemented the algorithm in a program and here are provided the steps of the algorithm, the results and some examples.
arxiv