Results 91 to 100 of about 133,492 (314)

Unraveling the Molecular Mechanisms of Glioma Recurrence: A Study Integrating Single‐Cell and Spatial Transcriptomics

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Glioma recurrence severely impacts patient prognosis, with current treatments showing limited efficacy. Traditional methods struggle to analyze recurrence mechanisms due to challenges in assessing tumor heterogeneity, spatial dynamics, and gene networks.
Lei Qiu   +10 more
wiley   +1 more source

Brainstem and Cerebellar Volume Loss and Associated Clinical Features in Progressive Supranuclear Palsy

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Introduction Progressive Supranuclear Palsy (PSP) is a neurodegenerative ‘tauopathy’ with predominating pathology in the basal ganglia and midbrain. Caudal tau spread frequently implicates the cerebellum; however, the pattern of atrophy remains equivocal.
Chloe Spiegel   +8 more
wiley   +1 more source

OSKR/OKAI: Systematic Optimization of Key Encapsulation Mechanisms from Module Lattice [PDF]

open access: green, 2021
Shiyu Shen   +4 more
openalex   +1 more source

Functional and Structural Evidence of Neurofluid Circuit Aberrations in Huntington Disease

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Disrupted neurofluid regulation may contribute to neurodegeneration in Huntington disease (HD). Because neurofluid pathways influence waste clearance, inflammation, and the distribution of central nervous system (CNS)–delivered therapeutics, understanding their dysfunction is increasingly important as targeted treatments emerge.
Kilian Hett   +8 more
wiley   +1 more source

On Constructing Dynamic and Forward Secure Authenticated Group Key Agreement Scheme from Multikey Encapsulation Mechanism

open access: yesThe Scientific World Journal, 2015
The approach of instantiating authenticated group key exchange (GAKE) protocol from the multikey encapsulation mechanism (mKEM) has an important advantage of achieving classical requirement of GAKE security in one communication round.
Iraj Fathirad, John Devlin
doaj   +1 more source

COVID‐19 Vaccination Is Not Associated With the Development of Idiopathic Inflammatory Myositis in US Veterans

open access: yesArthritis Care &Research, EarlyView.
Objective Several case reports have proposed a potential association between COVID‐19 vaccination and the subsequent development of idiopathic inflammatory myositis (IIM). This study examined prior COVID‐19 vaccination in US veterans who developed new‐onset IIM compared to those without new‐onset IIM.
Caleb Hernández   +10 more
wiley   +1 more source

Therapeutic Delivery Technology and its Economic Impact [PDF]

open access: yes, 2019
Therapeutic delivery technology is a current area of high interest in both university and industrial settings. These technologies are being developed in order to deliver therapeutic agents, such as genes, proteins, and drugs, to patients more efficiently.
Savas, Paul E., Jr.
core   +1 more source

Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited [PDF]

open access: yes, 2013
In CRYPTO 2010, Wee proposed the notion of ‘‘extractable hash proof systems” (XHPS), and its richer version, ‘‘all-but-one XHPS” (ABO-XHPS), and showed that chosen ciphertext secure (CCA secure) key encapsulation mechanisms (KEM) can be constructed from them.
Takahiro Matsuda, Goichiro Hanaoka
openaire   +1 more source

Enabling Digital Continuity in Virtual Manufacturing for Eco‐Efficiency Assessment of Lightweight Structures by Means of a Domain‐Specific Structural Mechanics Language: Requirements, Idea and Proof of Concept

open access: yesAdvanced Engineering Materials, EarlyView.
This article presents a solver‐agnostic domain‐specific language (DSL) for computational structural mechanics that strengthens interoperability in virtual product development. Using a hierarchical data model, the DSL enables seamless exchange between diverse simulation tools and numerical methods.
Martin Rädel   +3 more
wiley   +1 more source

Constructing Strong Designated Verifier Signatures from Key Encapsulation Mechanisms

open access: yes2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), 2019
A designated verifier signature (DVS) allows a signer to convince a verifier that a message has been endorsed in a way that the conviction cannot be transferred to any third party. This is achieved by the property that the signature can be generated by one of them. Since DVS is publicly verifiable, a valid DVS implies that the signature must be created
GONG, Borui, AU, Ho Man, XUE, Haiyang
openaire   +2 more sources

Home - About - Disclaimer - Privacy