Results 41 to 50 of about 55,338 (230)

Software Update Methodologies for Feature-Based Product Lines: A Combined Design Approach

open access: yesSoftware
The automotive industry is experiencing a significant shift, transitioning from traditional hardware-centric systems to more advanced software-defined architectures. This change is enabling enhanced autonomy, connectivity, safety, and improved in-vehicle
Abir Bazzi, Adnan Shaout, Di Ma
doaj   +1 more source

Secure and Efficient Code-Based Cryptography for Multi-Party Computation and Digital Signatures

open access: yesComputer Sciences & Mathematics Forum, 2023
Code-based cryptography is a promising candidate for post-quantum cryptography due to its strong security guarantees and efficient implementations. In this paper, we explore the use of code-based cryptography for multi-party computation and digital ...
Abdellatif Kichna, Abderrazak Farchane
doaj   +1 more source

Pre‐analytical optimization of cell‐free DNA and extracellular vesicle‐derived DNA for mutation detection in liquid biopsies

open access: yesMolecular Oncology, EarlyView.
Pre‐analytical handling critically determines liquid biopsy performance. This study defines practical best‐practice conditions for cell‐free DNA (cfDNA) and extracellular vesicle–derived DNA (evDNA), showing how processing time, storage conditions, tube type, and plasma input volume affect DNA integrity and mutation detection.
Jonas Dohmen   +11 more
wiley   +1 more source

Interrogating the immune landscape of microsatellite stable RAS‐mutated colon cancer

open access: yesMolecular Oncology, EarlyView.
COLOSSUS project RAS‐mutated MSS colon cancer study explored transcriptomics and immune cell density by immunohistochemistry (IHC), Immunoscore (IS), ISIC/TuLIS scores, mutation counts, and detected different prevalences but similar microenvironment composition across immune markers with clinical relevance for future immunotherapy combination ...
Rodrigo Dienstmann   +61 more
wiley   +1 more source

Watermarking public‐key cryptographic functionalities and implementations: The case of encryption and signatures

open access: yesIET Information Security, 2021
A watermarking scheme for a public‐key cryptographic functionality enables the embedding of a mark in the instance of the secret‐key algorithm such that the functionality of the original scheme is maintained, while it is infeasible for an adversary to ...
Foteini Baldimtsi   +2 more
doaj   +1 more source

A Blockchain-Based Digital Asset Platform with Multi-Party Certification

open access: yesApplied Sciences, 2022
Assets such as warehouse receipts are important for enterprises, which can be used to pledge in supply chain finance (SCF). However, traditional pledges are performed manually, which inevitably encounters inefficiency and security problems such as ...
Feng Liu, Zhefu Feng, Jiayin Qi
doaj   +1 more source

IMPDH inhibition enhances cytarabine efficacy in SAMHD1‐expressing leukaemia cells via guanine nucleotide depletion

open access: yesMolecular Oncology, EarlyView.
Cytarabine is a key therapy for acute myeloid leukaemia (AML), but its efficacy is limited by the dNTPase SAMHD1, which hydrolyses its active metabolite. Screening nucleotide biosynthesis inhibitors revealed that IMPDH inhibitors selectively sensitise SAMHD1‐proficient AML cells to cytarabine.
Miriam Yagüe‐Capilla   +9 more
wiley   +1 more source

Smaller public keys for MinRank-based schemes

open access: yesJournal of Mathematical Cryptology
MinRank is an NP-complete problem in linear algebra whose characteristics make it attractive to build post-quantum cryptographic primitives. Several MinRank-based digital signature schemes have been proposed.
Di Scala Antonio J., Sanna Carlo
doaj   +1 more source

Differential Fault Attacks on Deterministic Lattice Signatures

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2018
In this paper, we extend the applicability of differential fault attacks to lattice-based cryptography. We show how two deterministic lattice-based signature schemes, Dilithium and qTESLA, are vulnerable to such attacks.
Leon Groot Bruinderink, Peter Pessl
doaj   +1 more source

Efficient lattice‐based authenticated key exchange based on key encapsulation mechanism and signature

open access: yesIET Information Security, 2021
Authenticated key exchange protocol is widely applied in the Internet services. Lattice‐based key exchange protocols turn out to be quantum‐resistant and hence have attracted tremendous attention.
Guanhao Xue   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy