Results 71 to 80 of about 72,952 (289)

Expression and DNA methylation of 20S proteasome subunits as prognostic and resistance markers in cancer

open access: yesMolecular Oncology, EarlyView.
Comprehensive analysis of genomic mutations, gene expression, DNA methylation, and pathway analysis of TCGA data was carried out to define cancer types in which proteasome subunits expression is associated with worse survival. Albeit the effect of specific proteasome subunits on cellular function, the main role of the proteasome is better evaluated ...
Ruba Al‐Abdulla   +5 more
wiley   +1 more source

Detecting homologous recombination deficiency for breast cancer through integrative analysis of genomic data

open access: yesMolecular Oncology, EarlyView.
This study develops a semi‐supervised classifier integrating multi‐genomic data (1404 training/5893 validation samples) to improve homologous recombination deficiency (HRD) detection in breast cancer. Our method demonstrates prognostic value and predicts chemotherapy/PARP inhibitor sensitivity in HRD+ tumours.
Rong Zhu   +12 more
wiley   +1 more source

Comparative Experiments of V2X Security Protocol Based on Hash Chain Cryptography

open access: yesSensors, 2020
Vehicle-to-everything (V2X) is the communication technology designed to support road safety for drivers and autonomous driving. The light-weight security solution is crucial to meet the real-time needs of on-board V2X applications.
Shimaa A. Abdel Hakeem   +2 more
doaj   +1 more source

Data‐driven discovery of gene expression markers distinguishing pediatric acute lymphoblastic leukemia subtypes

open access: yesMolecular Oncology, EarlyView.
This study investigates gene expression differences between two major pediatric acute lymphoblastic leukemia (ALL) subtypes, B‐cell precursor ALL, and T‐cell ALL, using a data‐driven approach consisting of biostatistics and machine learning methods. Following analysis of a discovery dataset, we find a set of 14 expression markers differentiating the ...
Mona Nourbakhsh   +8 more
wiley   +1 more source

Another look at HMAC

open access: yesJournal of Mathematical Cryptology, 2013
HMAC is the most widely-deployed cryptographic-hash-function-based message authentication code. First, we describe a security issue that arises because of inconsistencies in the standards and the published literature regarding keylength.
Koblitz Neal, Menezes Alfred
doaj   +1 more source

Vulnerabilities and Limitations of MQTT Protocol Used between IoT Devices

open access: yesApplied Sciences, 2019
With the proliferation of smart devices capable of communicating over a network using different protocols, each year more and more successful attacks are recorded against these, underlining the necessity of developing and implementing mechanisms to ...
Dan Dinculeană, Xiaochun Cheng
doaj   +1 more source

MicroRNA 196a contributes to the aggressiveness of esophageal adenocarcinoma through the MYC/TERT/NFκB axis

open access: yesMolecular Oncology, EarlyView.
mir‐196a promotes Esophagus Adenocarcinoma aggressiveness. On one hand, mir‐196a targets the valosin‐containing protein (VCP) mRNA, causing the accumulation of c‐MYC protein that leads to high amounts of TERT. On the other hand, mir‐196a targets the inhibitor of NFκB (NFKBIA).
Jesús García‐Castillo   +8 more
wiley   +1 more source

AUTHENTICATION, TAMPER LOCALIZATION AND RECTIFICATION ALGORITHM WITH PRIVACY PRESERVATION OF IMAGE FOR THE CLOUD USING HMAC

open access: yesICTACT Journal on Image and Video Processing, 2017
Digital images like military, medical and quality control images are increasingly stored over cloud server. These images need protection against attempts to manipulate them since manipulations could tamper the decisions based on these images, many ...
Sayyada Fahmeeda Sultana, D C Shubhangi
doaj   +1 more source

Comprehensive omics‐based classification system in adult patients with B‐cell acute lymphoblastic leukemia

open access: yesMolecular Oncology, EarlyView.
The COMBAT classification system, developed through multi‐omics integration, stratifies adult patients with B‐cell acute lymphoblastic leukemia(B‐ALL) into three molecular subtypes with distinct surface antigen patterns, immune landscape, methylation patterns, biological pathways and prognosis.
Yang Song   +11 more
wiley   +1 more source

Message authentication codes for the Network Time Protocol [PDF]

open access: yes, 2018
RFC 5905 [RFC5905] states that Network Time Protocol (NTP) packets should be authenticated by appending a 128-bit key to the NTP data, and hashing the result with MD5 to obtain a 128-bit tag. This document deprecates MD5-based authentication,
Goldberg, Sharon, Malhotra, Aanchal
core  

Home - About - Disclaimer - Privacy