Results 51 to 60 of about 20,722 (263)

Search Me If You Can: Privacy-preserving Location Query Service [PDF]

open access: yes, 2013
Location-Based Service (LBS) becomes increasingly popular with the dramatic growth of smartphones and social network services (SNS), and its context-rich functionalities attract considerable users.
Jung, Taeho, Li, Xiang-Yang
core   +2 more sources

Subtype‐specific enhancer RNAs define transcriptional regulators and prognosis in breast cancers

open access: yesMolecular Oncology, EarlyView.
This study employed machine learning methodologies to perform the subtype‐specific classification of RNA‐seq data sets, which are mapped on enhancers from TCGA‐derived breast cancer patients. Their integration with gene expression (referred to as ProxCReAM eRNAs) and chromatin accessibility profiles has the potential to identify lineage‐specific and ...
Aamena Y. Patel   +6 more
wiley   +1 more source

URDP: General Framework for Direct CCA2 Security from any Lattice-Based PKE Scheme [PDF]

open access: yes, 2013
Design efficient lattice-based cryptosystem secure against adaptive chosen ciphertext attack (IND-CCA2) is a challenge problem. To the date, full CCA2-security of all proposed lattice-based PKE schemes achieved by using a generic transformations such as ...
Rastaghi, Roohallah
core  

Distributed operating systems [PDF]

open access: yes, 1986
In the past five years, distributed operating systems research has gone through a consolidation phase. On a large number of design issues there is now considerable consensus between different research groups.\ud \ud In this paper, an overview of recent ...
Mullender, Sape J.
core   +3 more sources

Network divergence analysis identifies adaptive gene modules and two orthogonal vulnerability axes in pancreatic cancer

open access: yesMolecular Oncology, EarlyView.
Tumors contain diverse cellular states whose behavior is shaped by context‐dependent gene coordination. By comparing gene–gene relationships across biological contexts, we identify adaptive transcriptional modules that reorganize into distinct vulnerability axes.
Brian Nelson   +9 more
wiley   +1 more source

Longitude : a privacy-preserving location sharing protocol for mobile applications [PDF]

open access: yes, 2011
Location sharing services are becoming increasingly popular. Although many location sharing services allow users to set up privacy policies to control who can access their location, the use made by service providers remains a source of concern.
A. Beresford   +14 more
core   +3 more sources

(Hierarchical) Identity-Based Encryption from Affine Message Authentication [PDF]

open access: yes, 2014
We provide a generic transformation from any affine message authentication code (MAC) to an identity-based encryption (IBE) scheme over pairing groups of prime order. If the MAC satisfies a security notion related to unforgeability against chosen-message attacks and, for example, the k-Linear assumption holds, then the resulting IBE scheme is ...
Blazy, Olivier, Kiltz, Eike, Pan, Jiaxin
openaire   +1 more source

Transcriptional profiling of circulating extracellular vesicles from prebiopsy prostate cancer patients

open access: yesMolecular Oncology, EarlyView.
RNA profiling of circulating extracellular vesicles (EVs) from blood samples of men undergoing prostate biopsy identifies transcripts associated with clinically significant prostate cancer. Integrative analysis with public tumor datasets links EV‐derived gene signatures to tumor stage and progression‐free survival, highlighting CASP3, XRCC2, and RIT1 ...
Stefan Werner   +14 more
wiley   +1 more source

Hierarchical Identity Based Encryption with Polynomially Many Levels [PDF]

open access: yes, 2009
We present the first hierarchical identity based encryption (HIBE) system that has full security for more than a constant number of levels. In all prior HIBE systems in the literature, the security reductions suffered from exponential degradation in the depth of the hierarchy, so these systems were only proven fully secure for identity hierarchies of ...
Craig Gentry, Shai Halevi
openaire   +1 more source

Tumor‐stromal crosstalk and macrophage enrichment are associated with chemotherapy response in bladder cancer

open access: yesFEBS Open Bio, EarlyView.
Chemoresistance in bladder cancer: Macrophage recruitment associated with CXCL1, CXCL5 and CXCL8 expression is characteristic of Gemcitabine/Cisplatin (Gem/Cis) Non‐Responder tumors (right side) while Responder tumors did not show substantial tumor‐stromal crosstalk (left side). All biological icons are attributed to Bioicons: carcinoma, cancerous‐cell‐
Sophie Leypold   +11 more
wiley   +1 more source

Home - About - Disclaimer - Privacy