Results 71 to 80 of about 81,733 (278)

Secure and {\sl Practical} Identity-Based Encryption [PDF]

open access: yes, 2005
In this paper, we present a variant of Waters' Identity-Based Encryption scheme with a much smaller public-key size (only a few kilobytes). We show that this variant is semantically secure against passive adversaries in the standard model.\smallskip In
Naccache, David
core   +1 more source

Digital Signature Security in Data Communication

open access: yes, 2018
Authenticity of access in very information are very important in the current era of Internet-based technology, there are many ways to secure information from irresponsible parties with various security attacks, some of technique can use for defend attack
Abdillah, Leon Andretti   +8 more
core   +1 more source

KDM7A and KDM1A inhibition suppresses tumour promoting pathways in prostate cancer

open access: yesMolecular Oncology, EarlyView.
Treatment resistance is a major challenge for patients with advanced prostate cancer. This study examined an alternative approach to target the major prostate cancer‐promoting pathway by targeting epigenetic factors, whose levels are higher in tumours.
Jennie N Jeyapalan   +16 more
wiley   +1 more source

NKCC1: A key regulator of glioblastoma progression

open access: yesMolecular Oncology, EarlyView.
Glioblastoma (GBM) progression is driven by disrupted chloride cotransporter homeostasis. NKCC1 is highly expressed in stem‐like, astrocytic, and progenitor cells, correlating with earlier recurrence, while overall survival remains unaffected. NKCC1 serves as a prognostic marker and potential therapeutic target, linking chloride transporter imbalance ...
Anja Thomsen   +5 more
wiley   +1 more source

Optimal Data Sharing with Forward Security

open access: yesInternational Journal of Computer Applications, 2016
Cloud Computing is one of the best platform which provides huge data storage and data sharing all over the time and also easily available to the users. Data sharing in the cloud contains the several issues such as data integrity, authenticity, anonymity and privacy of data owner.
B. M., Deepika V.
openaire   +1 more source

Formal Computational Unlinkability Proofs of RFID Protocols

open access: yes, 2017
We set up a framework for the formal proofs of RFID protocols in the computational model. We rely on the so-called computationally complete symbolic attacker model. Our contributions are: i) To design (and prove sound) axioms reflecting the properties of
Comon, Hubert, Koutsos, Adrien
core   +1 more source

Interaction of HS1BP3 with cortactin modulates TKS5 localisation, cell secretion and cancer malignancy

open access: yesMolecular Oncology, EarlyView.
Here, we demonstrate that HS1BP3 interacts with Cortactin through a proline‐rich region (PRR3.1) and show that this interaction, and HS1BP3 itself, promote cancer cell proliferation and invasion. Inhibition of this interaction leads to build‐up of TKS5 in multivesicular endosomes and altered secretion of CD63 and CD9, providing an explanation for the ...
Arja Arnesen Løchen   +9 more
wiley   +1 more source

Dynamic Searchable Symmetric Encryption Based on Protected Search Mode of Updatable Encryption [PDF]

open access: yesJisuanji kexue
Dynamic searchable symmetric encryption(DSSE) technology,as an extension of static searchable encryption,has attracted much attention because it solves the problem of secure retrieval over encrypted data and supports data dynamicity.For practicality ...
XU Chengzhi, XU Lei, XU Chungen
doaj   +1 more source

Revisiting Mission‐Oriented Cancer Research to tackle the increasing burden of cancer in Europe–a policy perspective

open access: yesMolecular Oncology, EarlyView.
Translational cancer research and its implementation through competitively selected Comprehensive Cancer Centers across Europe should be the primary policy focus for addressing the increasing cancer burden in Europe and counteract the present main strategy to convert cancer to a chronic disease.
Manuel Heitor   +2 more
wiley   +1 more source

Clinical performance of the urine‐based TERT promoter AbsoluteQ Digital PCR for non‐invasive detection of bladder cancer

open access: yesMolecular Oncology, EarlyView.
A urine‐based digital PCR assay targeting two hotspot TERT promoter variants detected bladder cancer with high sensitivity and no false positives in this case–control cohort. The streamlined AbsoluteQ workflow outperformed Sanger sequencing and supports non‐invasive molecular testing for bladder cancer detection.
Anna Nykel   +12 more
wiley   +1 more source

Home - About - Disclaimer - Privacy