Results 151 to 160 of about 299,742 (318)
RKIP, a metastasis suppressor protein, modulates key oncogenic pathways in lung adenocarcinoma. In silico analyses linked low RKIP expression to poor survival. Functional studies revealed RKIP overexpression reduces tumor aggressiveness and enhances sensitivity to EGFR‐targeted therapies, while its loss promotes resistance.
Ana Raquel‐Cunha+10 more
wiley +1 more source
Low‐power Implementation of an Encryption/Decryption System with Asynchronous Techniques [PDF]
Nicolas Sklavos+3 more
openalex +1 more source
Decrypting cancer's spatial code: from single cells to tissue niches
Spatial transcriptomics maps gene activity across tissues, offering powerful insights into how cancer cells are organised, switch states and interact with their surroundings. This review outlines emerging computational, artificial intelligence (AI) and geospatial approaches to define cell states, uncover tumour niches and integrate spatial data with ...
Cenk Celik+4 more
wiley +1 more source
Multiparty Computation from Threshold Homomorphic Encryption
Ronald Cramer+2 more
openalex +2 more sources
Loss‐of‐function mutations in the scaffold subunit of protein phosphatase 2A (PP2A), PPP2R1A, sensitize ovarian clear cell carcinoma to immune checkpoint blockade (ICB) by enhancing the interferon gamma response and promoting antitumor immune cell infiltration.
Matheus Henrique Dias, René Bernards
wiley +1 more source
Efficient Protocols based on Probabilistic Encryption using Composite Degree Residue Classes
Ivan Damgård, Mads J. Jurik
openalex +2 more sources
A‐to‐I editing of miRNAs, particularly miR‐200b‐3p, contributes to HGSOC progression by enhancing cancer cell proliferation, migration and 3D growth. The edited form is linked to poorer patient survival and the identification of novel molecular targets.
Magdalena Niemira+14 more
wiley +1 more source
Improved Non-Committing Encryption Schemes based on a General Complexity Assumption
Ivan Damgård, Jesper Buus Nielsen
openalex +2 more sources
The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?) [PDF]
Hugo Krawczyk
openalex +1 more source