Results 111 to 120 of about 230,478 (367)

Clinical applications of next‐generation sequencing‐based ctDNA analyses in breast cancer: defining treatment targets and dynamic changes during disease progression

open access: yesMolecular Oncology, EarlyView.
Circulating tumor DNA (ctDNA) offers a possibility for different applications in early and late stage breast cancer management. In early breast cancer tumor informed approaches are increasingly used for detecting molecular residual disease (MRD) and early recurrence. In advanced stage, ctDNA provides a possibility for monitoring disease progression and
Eva Valentina Klocker   +14 more
wiley   +1 more source

Secure and Authenticated Data Communication in Wireless Sensor Networks

open access: yesSensors, 2015
Securing communications in wireless sensor networks is increasingly important as the diversity of applications increases. However, even today, it is equally important for the measures employed to be energy efficient.
Omar Alfandi   +4 more
doaj   +1 more source

The Peacock Encryption Method [PDF]

open access: yesarXiv, 2010
Here is described a preliminary method that enables secure 'anti-search-engine' encryption, where the middleman can participate in the encrypted information exchange, without being able to understand the exchanged information, encrypted using a one-way function, as well as being unaware of one of two main exchange participants.
arxiv  

Addressing persistent challenges in digital image analysis of cancer tissue: resources developed from a hackathon

open access: yesMolecular Oncology, EarlyView.
Large multidimensional digital images of cancer tissue are becoming prolific, but many challenges exist to automatically extract relevant information from them using computational tools. We describe publicly available resources that have been developed jointly by expert and non‐expert computational biologists working together during a virtual hackathon
Sandhya Prabhakaran   +16 more
wiley   +1 more source

Stream Deniable-Encryption Algorithms [PDF]

open access: yesComputer Science Journal of Moldova, 2016
A method for stream deniable encryption of secret message is proposed, which is computationally indistinguishable from the probabilistic encryption of some fake message. The method uses generation of two key streams with some secure block cipher.
N.A. Moldovyan   +3 more
doaj  

Three Techniques for Enhancing Chaos-Based Joint Compression and Encryption Schemes

open access: yesEntropy, 2019
In this work, three techniques for enhancing various chaos-based joint compression and encryption (JCAE) schemes are proposed. They respectively improved the execution time, compression ratio, and estimation accuracy of three different chaos-based JCAE ...
Chao-Jen Tsai   +2 more
doaj   +1 more source

Commutative-like Encryption: A New Characterization of ElGamal [PDF]

open access: yesarXiv, 2010
Commutative encryption is a useful but rather strict notion in cryptography. In this paper, we deny a loose variation of commutative encryption-commutative-like encryption and give an example: the generalization of ElGamal scheme. The application of the new variation is also discussed.
arxiv  

Polyfunctional CD8+CD226+RUNX2hi effector T cells are diminished in advanced stages of chronic lymphocytic leukemia

open access: yesMolecular Oncology, EarlyView.
CD226+CD8+ T cells express elevated levels of RUNX2, exhibit higher proliferation capacity, cytokines and cytolytic molecules expression, and migratory capacity. In contrast, CD226−CD8+ T cells display an exhausted phenotype associated with the increased expression of co‐inhibitory receptors and impaired effector functions.
Maryam Rezaeifar   +4 more
wiley   +1 more source

Bright and Multicolor Chemiluminescent Carbon Nanodots for Advanced Information Encryption

open access: yesAdvanced Science, 2019
The various luminescent properties of carbon nanodots (CDs) reveal fascinating applications in several areas. Here, bright and multicolor chemiluminescence (CL) is realized from CDs, whose CL quantum yield can be optimized by adjusting the energy level ...
Cheng‐Long Shen   +6 more
doaj   +1 more source

Protection of Semantic Organized Data. Encryption of RDF Graph

open access: yesDigital Presentation and Preservation of Cultural and Scientific Heritage, 2014
The problems of protection of semantic organized data and encryption of RDF graph are investigated. Technologies used in the construction of a semantic network are presented.
Galina Bogdanova   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy