Results 71 to 80 of about 133,439 (330)

ShcD adaptor protein drives invasion of triple negative breast cancer cells by aberrant activation of EGFR signaling

open access: yesMolecular Oncology, EarlyView.
We identified adaptor protein ShcD as upregulated in triple‐negative breast cancer and found its expression to be correlated with reduced patient survival and increased invasion in cell models. Using a proteomic screen, we identified novel ShcD binding partners involved in EGFR signaling pathways.
Hayley R. Lau   +11 more
wiley   +1 more source

Digital Signature Schemes with Complementary Functionality and Applications

open access: yesБезопасность информационных технологий, 2012
Digital signature schemes with additional functionality (an undeniable signature, a signature of the designated confirmee, a signature blind, a group signature, a signature of the additional protection) and examples of their application are considered ...
S. N. Kyazhin
doaj  

Quotable Signatures for Authenticating Shared Quotes [PDF]

open access: yesarXiv, 2022
Quotable signature schemes are digital signature schemes with the additional property that from the signature for a message, any party can extract signatures for (allowable) quotes from the message, without knowing the secret key or interacting with the signer of the original message.
arxiv  

Targeting the AKT/mTOR pathway attenuates the metastatic potential of colorectal carcinoma circulating tumor cells in a murine xenotransplantation model

open access: yesMolecular Oncology, EarlyView.
Dual targeting of AKT and mTOR using MK2206 and RAD001 reduces tumor burden in an intracardiac colon cancer circulating tumor cell xenotransplantation model. Analysis of AKT isoform‐specific knockdowns in CTC‐MCC‐41 reveals differentially regulated proteins and phospho‐proteins by liquid chromatography coupled mass spectrometry. Circulating tumor cells
Daniel J. Smit   +19 more
wiley   +1 more source

Pharmacological effects of osimertinib on a chicken chorioallantoic membrane xenograft model with the EGFR exon‐19‐deleted advanced NSCLC mutation

open access: yesFEBS Open Bio, EarlyView.
Osimertinib reduces angiogenesis and PDL1 expression in in ovo tumors, transforming them into ‘cold tumors’ with lower immune activity. Anatomopathological and transcriptomic analyses highlight its therapeutic impact on tumor biology. This study underscores osimertinib's potential to reshape the tumor microenvironment and provides insights into its ...
David Barthélémy   +14 more
wiley   +1 more source

Cryptanalysis and improvement of several certificateless digital signature schemes

open access: yesTongxin xuebao, 2008
The security flaws of the certificateless digital signature schemes proposed by Liu-Au-Susilo (2007),Goranlta-Saxena (2005),Cao-Paterson-Kou(2006),Yap-Heng-Goi(2006) and Je Hong Park(2006)were analyzed.
WANG Hua-qun1   +2 more
doaj   +2 more sources

On the Classification of Proxy Digital Signature Schemes

open access: yesБезопасность информационных технологий, 2010
We provide a classification of proxy digital signature schemes based on common classification of digital signature schemes of Z. Cao, which is modified according to new functionality requirements of the schemes.
A. A. Varfolomeev
doaj  

Quantum digital signature scheme [PDF]

open access: yesarXiv, 2015
Digital signatures are the building blocks of modern communication to prevent masquerading by any party other than recipients, repudiation by signatory and forgery by any individual recipient. Digital signature scheme is said to be standard if the signature (a) is a pattern depending upon the message to be signed, (b) is built upon some information ...
arxiv  

Position‐dependent offset corrections for ring applicator reconstruction in cervical cancer brachytherapy

open access: yesJournal of Applied Clinical Medical Physics, EarlyView.
Abstract Purpose Due to the tight curvature in their design, ring applicators are usually associated with large positioning errors. The standard practice to correct for these deviations based on global offsets may not be sufficient to comply with the recommended tolerance.
Leon G. Aldrovandi   +3 more
wiley   +1 more source

Signcryption scheme based on schnorr digital signature [PDF]

open access: yesarXiv, 2012
This article presents a new signcryption scheme which is based on the Schnorr digital signature algorithm. The new scheme represents my personal contribution to signcryption area. I have been implemented the algorithm in a program and here are provided the steps of the algorithm, the results and some examples.
arxiv  

Home - About - Disclaimer - Privacy