Results 101 to 110 of about 441,462 (365)

Homomorphic Encryption

open access: yesProcedia Computer Science, 2013
AbstractThe study of homomorphic encryption techniques has led to significant advancements in the computing domain, particularly in the sphere of cloud computing. Homomorphic encryption provides a means for securely transmitting and storing confidential information across and in a computer system.
Ogburn, Monique   +2 more
openaire   +1 more source

Intron‐oriented HTLV‐1 integration in an adult T‐cell leukemia/lymphoma cell line sustains expression of intact ift81 mRNA

open access: yesFEBS Letters, EarlyView.
In the adult T‐cell leukemia/lymphoma (ATL) cell line ED, the human T‐cell leukemia virus type 1 (HTLV‐1) provirus was integrated into the intron of the ift81 gene in the antisense orientation. Despite this integration, both the intact ift81 and the viral oncogene hbz were simultaneously expressed, likely due to the functional insufficiency of viral ...
Mayuko Yagi   +5 more
wiley   +1 more source

Subpar reporting of pre‐analytical variables in RNA‐focused blood plasma studies

open access: yesMolecular Oncology, EarlyView.
Pre‐analytical variables strongly influence the analysis of extracellular RNA (cell‐free RNA; exRNA) derived from blood plasma. Their reporting is essential to allow interpretation and replication of results. By evaluating 200 exRNA studies, we pinpoint a lack of reporting pre‐analytical variables associated with blood collection, plasma preparation ...
Céleste Van Der Schueren   +16 more
wiley   +1 more source

Bright and Multicolor Chemiluminescent Carbon Nanodots for Advanced Information Encryption

open access: yesAdvanced Science, 2019
The various luminescent properties of carbon nanodots (CDs) reveal fascinating applications in several areas. Here, bright and multicolor chemiluminescence (CL) is realized from CDs, whose CL quantum yield can be optimized by adjusting the energy level ...
Cheng‐Long Shen   +6 more
doaj   +1 more source

RSA algoritam i njegova praktična primena / RSA algorithm

open access: yesVojnotehnički Glasnik, 2010
RSA algoritam jeste algoritam sa javnim ključem koji uključuje tri koraka: generisanje ključa, enkripciju i dekripciju. RSA enkripciona šema je determinističaka što znači da se osnovni tekst uvek enkriptuje u isti šifrovani tekst za unapred zadati javni ...
Sonja R. Kuljanski
doaj   +1 more source

Security Through Amnesia: A Software-Based Solution to the Cold Boot Attack on Disk Encryption [PDF]

open access: yes, 2011
Disk encryption has become an important security measure for a multitude of clients, including governments, corporations, activists, security-conscious professionals, and privacy-conscious individuals.
Simmons, Patrick
core   +1 more source

Surfaceome: a new era in the discovery of immune evasion mechanisms of circulating tumor cells

open access: yesMolecular Oncology, EarlyView.
In the era of immunotherapies, many patients either do not respond or eventually develop resistance. We propose to pave the way for proteomic analysis of surface‐expressed proteins called surfaceome, of circulating tumor cells. This approach seeks to identify immune evasion mechanisms and discover potential therapeutic targets. Circulating tumor cells (
Doryan Masmoudi   +3 more
wiley   +1 more source

Clinical applications of next‐generation sequencing‐based ctDNA analyses in breast cancer: defining treatment targets and dynamic changes during disease progression

open access: yesMolecular Oncology, EarlyView.
Circulating tumor DNA (ctDNA) offers a possibility for different applications in early and late stage breast cancer management. In early breast cancer tumor informed approaches are increasingly used for detecting molecular residual disease (MRD) and early recurrence. In advanced stage, ctDNA provides a possibility for monitoring disease progression and
Eva Valentina Klocker   +14 more
wiley   +1 more source

MET variants with activating N‐lobe mutations identified in hereditary papillary renal cell carcinomas still require ligand stimulation

open access: yesMolecular Oncology, EarlyView.
MET variants in the N‐lobe of the kinase domain, found in hereditary papillary renal cell carcinoma, require ligand stimulation to promote cell transformation, in contrast to other RTK variants. This suggests that HGF expression in the microenvironment is important for tumor growth in such patients. Their sensitivity to MET inhibitors opens the way for
Célia Guérin   +14 more
wiley   +1 more source

A simple encryption algorithm [PDF]

open access: yes, 2017
In this paper I present a Simple Encryption Algorithm (SEAL), by which 128-bit long blocks can be quickly encrypted/decrypted. The algorithm is designed to run efficiently in software without any specialized hardware while still guaranteeing a strong degree of confidentiality.
openaire   +1 more source

Home - About - Disclaimer - Privacy