Results 51 to 60 of about 55,338 (230)

Survey of code-based digital signatures

open access: yes网络与信息安全学报, 2021
The rapid development of quantum computing theory and practice brings great uncertainty to the security of cryptography based on hard problems in number theory.
SONG Yongcheng   +2 more
doaj   +1 more source

Keratin 19 as a prognostic marker and contributing factor of metastasis and chemoresistance in high‐grade serous ovarian cancer

open access: yesMolecular Oncology, EarlyView.
Keratin 19 (KRT19) is overexpressed in high‐grade serous ovarian cancer with high levels of Kallikrein‐related peptidases (KLK) 4–7 and is associated with poor survival. In vivo analyses demonstrate that elevated KRT19 increases peritoneal tumour burden.
Sophia Bielesch   +13 more
wiley   +1 more source

Establishment of a humanized patient‐derived xenograft mouse model of high‐grade serous ovarian cancer for preclinical evaluation of combination immunotherapy

open access: yesMolecular Oncology, EarlyView.
We have established a humanized orthotopic patient‐derived xenograft (Hu‐oPDX) mouse model of high‐grade serous ovarian cancer (HGSOC) that recapitulates human tumor–immune interactions. Using combined anti‐PD‐L1/anti‐CD73 immunotherapy, we demonstrate the model's improved biological relevance and enhanced translational value for preclinical ...
Luka Tandaric   +10 more
wiley   +1 more source

FGFR Like1 drives esophageal cancer progression via EMT, PI3K/Akt, and notch signalling: insights from clinical data and next‐generation sequencing analysis

open access: yesFEBS Open Bio, EarlyView.
Clinical analysis reveals significant dysregulation of FGFRL1 in esophageal cancer (EC) patients. RNAi‐coupled next‐generation sequencing (NGS) and in vitro study reveal FGFRL1‐mediated EC progression via EMT, PI3K/Akt, and Notch pathways. Functional assays confirm its role in tumor growth, migration, and invasion.
Aprajita Srivastava   +3 more
wiley   +1 more source

Modified pqsigRM: RM Code-Based Signature Scheme

open access: yesIEEE Access, 2020
We present a novel code-based signature scheme called modified pqsigRM. This scheme is based on a modified Reed-Muller (RM) code, which reduces the signing complexity and key size compared with existing code-based signature schemes.
Yongwoo Lee   +3 more
doaj   +1 more source

Prediction of Myasthenia Gravis Worsening: A Machine Learning Algorithm Using Wearables and Patient‐Reported Measures

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background Myasthenia gravis (MG) is a rare disorder characterized by fluctuating muscle weakness with potential life‐threatening crises. Timely interventions may be delayed by limited access to care and fragmented documentation. Our objective was to develop predictive algorithms for MG deterioration using multimodal telemedicine data ...
Maike Stein   +7 more
wiley   +1 more source

Discovery and Targeted Proteomic Studies Reveal Striatal Markers Validated for Huntington's Disease

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Clinical trials for Huntington's disease (HD) enrolling persons before clinical motor diagnosis (CMD) lack validated biomarkers. This study aimed to conduct an unbiased discovery analysis and a targeted examination of proteomic biomarkers scrutinized by clinical validation. Methods Cerebrospinal fluid was obtained from PREDICT‐HD and
Daniel Chelsky   +8 more
wiley   +1 more source

Remote Monitoring in Myasthenia Gravis: Exploring Symptom Variability

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background Myasthenia gravis (MG) is a rare, autoimmune disorder characterized by fluctuating muscle weakness and potential life‐threatening crises. While continuous specialized care is essential, access barriers often delay timely interventions. To address this, we developed MyaLink, a telemedical platform for MG patients.
Maike Stein   +13 more
wiley   +1 more source

Digital Signature

open access: yes, 2023
AbstractA digital signature uses cryptographic hashing functions and asymmetric cryptography to sign data. It also provides origin authentication, data integrity, and signer non-repudiation. The main idea is to generate a hash of the data using a cryptographic hashing function and then encrypt it by the signing party using its private key.
openaire   +2 more sources

Development of a Prediction Model for Progression Risk in High‐Grade Gliomas Based on Habitat Radiomics and Pathomics

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective To investigate the value of constructing models based on habitat radiomics and pathomics for predicting the risk of progression in high‐grade gliomas. Methods This study conducted a retrospective analysis of preoperative magnetic resonance (MR) images and pathological sections from 72 patients diagnosed with high‐grade gliomas (52 ...
Yuchen Zhu   +14 more
wiley   +1 more source

Home - About - Disclaimer - Privacy