Results 61 to 70 of about 264,704 (267)

COMP–PMEPA1 axis promotes epithelial‐to‐mesenchymal transition in breast cancer cells

open access: yesMolecular Oncology, EarlyView.
This study reveals that cartilage oligomeric matrix protein (COMP) promotes epithelial‐to‐mesenchymal transition (EMT) in breast cancer. We identify PMEPA1 (protein TMEPAI) as a novel COMP‐binding partner that mediates EMT via binding to the TSP domains of COMP, establishing the COMP–PMEPA1 axis as a key EMT driver in breast cancer.
Konstantinos S. Papadakos   +6 more
wiley   +1 more source

fPADnet: Small and Efficient Convolutional Neural Network for Presentation Attack Detection

open access: yesSensors, 2018
The rapid growth of fingerprint authentication-based applications makes presentation attack detection, which is the detection of fake fingerprints, become a crucial problem.
Thi Hai Binh Nguyen   +4 more
doaj   +1 more source

Cube attacks on round-reduced TinyJAMBU

open access: yesScientific Reports, 2022
Lightweight cryptography has recently gained importance as the number of Internet of things (IoT) devices connected to Internet grows. Its main goal is to provide cryptographic algorithms that can be run efficiently in resource-limited environments such ...
Wil Liam Teng   +4 more
doaj   +1 more source

Attacking quantum key distribution with single-photon two-qubit quantum logic

open access: yes, 2005
The Fuchs-Peres-Brandt (FPB) probe realizes the most powerful individual attack on Bennett-Brassard 1984 quantum key distribution (BB84 QKD) by means of a single controlled-NOT (CNOT) gate.
Shapiro, Jeffrey H., Wong, Franco N. C.
core   +1 more source

Hijacking emergency granulopoiesis: Neutrophil ontogeny and reprogramming in cancer

open access: yesMolecular Oncology, EarlyView.
Neutrophils are highly plastic innate immune cells; their functions in cancer extend beyond the tumour microenvironment. This Review summarises current understanding of neutrophil maturation and heterogeneity and highlights tumour‐induced granulopoiesis as a systemic programme that expands immature, immunosuppressive neutrophils via tumour‐derived ...
Gabriela Marinescu, Yi Feng
wiley   +1 more source

Generalized Nonlinear Invariant Attack and a New Design Criterion for Round Constants

open access: yesIACR Transactions on Symmetric Cryptology, 2018
The nonlinear invariant attack was introduced at ASIACRYPT 2016 by Todo et al.. The attack has received extensive attention of cryptographic community due to its practical application on the full-round block ciphers SCREAM, iSCREAM, and Midori64. However,
Yongzhuang Wei   +3 more
doaj   +1 more source

Formal Computational Unlinkability Proofs of RFID Protocols

open access: yes, 2017
We set up a framework for the formal proofs of RFID protocols in the computational model. We rely on the so-called computationally complete symbolic attacker model. Our contributions are: i) To design (and prove sound) axioms reflecting the properties of
Comon, Hubert, Koutsos, Adrien
core   +1 more source

Pathogenic Neurofibromatosis type 1 gene variants in tumors of non‐NF1 patients and role of R1276

open access: yesFEBS Open Bio, EarlyView.
Somatic variants of the neurofibromatosis type 1 (NF1) gene occur across neoplasms without clinical manifestation of the disease NF1. We identified emerging somatic pathogenic NF1 variants and hotspots, for example, at the arginine finger 1276. Those missense variants provide fundamental information about neurofibromin's role in cancer.
Mareike Selig   +7 more
wiley   +1 more source

EM Analysis in the IoT Context: Lessons Learned from an Attack on Thread

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2018
The distinguishing feature of the Internet of Things is that many devices get interconnected. The threat of side-channel attacks in this setting is less understood than the threat of traditional network and software exploitation attacks that are ...
Daniel Dinu, Ilya Kizhvatov
doaj   +1 more source

Distinguishing Attacks on the Stream Cipher Py [PDF]

open access: yes, 2006
The stream cipher Py designed by Biham and Seberry is a submission to the ECRYPT stream cipher competition. The cipher is based on two large arrays (one is 256 bytes and the other is 1040 bytes) and it is designed for high speed software applications (Py is more than 2.5 times faster than the RC4 on Pentium III).
Souradyuti Paul   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy