Results 51 to 60 of about 12,868 (287)

Efficient Anonymous Certificateless Multi-Receiver Signcryption Scheme Without Bilinear Pairings

open access: yesIEEE Access, 2018
Certificateless multi-receiver encryption/signcryption (CLME/CLMS) has become a research hotspot in the field of information security. Almost all of the existing CLME/CLMS schemes are constructed based on the bilinear pairing computation, a time ...
Liaojun Pang   +3 more
doaj   +1 more source

Still Wrong Use of Pairings in Cryptography [PDF]

open access: yes, 2016
Several pairing-based cryptographic protocols are recently proposed with a wide variety of new novel applications including the ones in emerging technologies like cloud computing, internet of things (IoT), e-health systems and wearable technologies ...
Kiraz, Mehmet Sabir, Uzunkol, Osmanbey
core   +1 more source

A Practical Set-Membership Proof for Privacy-Preserving NFC Mobile Ticketing [PDF]

open access: yes, 2015
To ensure the privacy of users in transport systems, researchers are working on new protocols providing the best security guarantees while respecting functional requirements of transport operators.
Arfaoui, Ghada   +5 more
core   +6 more sources

Transcriptional network analysis of PTEN‐protein‐deficient prostate tumors reveals robust stromal reprogramming and signs of senescent paracrine communication

open access: yesMolecular Oncology, EarlyView.
Combining PTEN protein assessment and transcriptomic profiling of prostate tumors, we uncovered a network enriched in senescence and extracellular matrix (ECM) programs associated with PTEN loss and conserved in a mouse model. We show that PTEN‐deficient cells trigger paracrine remodeling of the surrounding stroma and this information could help ...
Ivana Rondon‐Lorefice   +16 more
wiley   +1 more source

A concrete certificateless signature scheme without pairings [PDF]

open access: yes, 2009
Certificateless public key cryptography was introduced to avoid the inherent key escrow problem in identity-based cryptography, and eliminate the use of certificates in traditional PKI. Most cryptographic schemes in certificateless cryptography are built
Chen, Shaozhen, Ge, Aijun, Huang, Xinyi
core   +2 more sources

Peroxidasin enables melanoma immune escape by inhibiting natural killer cell cytotoxicity

open access: yesMolecular Oncology, EarlyView.
Peroxidasin (PXDN) is secreted by melanoma cells and binds the NK cell receptor NKG2D, thereby suppressing NK cell activation and cytotoxicity. PXDN depletion restores NKG2D signaling and enables effective NK cell–mediated melanoma killing. These findings identify PXDN as a previously unrecognized immune evasion factor and a potential target to improve
Hsu‐Min Sung   +17 more
wiley   +1 more source

Pairing Optimizations for Isogeny-Based Cryptosystems

open access: yesIET Information Security
In isogeny-based cryptography, bilinear pairings are regarded as a powerful tool in various applications, including key compression, public key validation, and torsion basis generation. However, in most isogeny-based protocols, the performance of pairing
Shiping Cai, Kaizhan Lin, Chang-An Zhao
doaj   +1 more source

Efficient software implementation of pairing based cryptography [PDF]

open access: yes, 2012
筑波大学University of Tsukuba博士(工学)Doctor of Philosophy in Engineering2011【要旨 ...
96811, 照屋, 唯紀
core  

Correlation of the differential expression of PIK3R1 and its spliced variant, p55α, in pan‐cancer

open access: yesMolecular Oncology, EarlyView.
PIK3R1 undergoes alternative splicing to generate the isoforms, p85α and p55α. By combining large patient datasets with laboratory experiments, we show that PIK3R1 spliced variants shape cancer behavior. While tumors lose the protective p85α isoform, p55α is overexpressed, changes linked to poorer survival and more pronounced in African American ...
Ishita Gupta   +10 more
wiley   +1 more source

An Enhancement of the Elliptic Curve Cryptography by Using the PairingFunction

open access: yesAcademic Science Journal
In this paper, we propose two new algorithms to increase the security of the Elliptic Curve Cryptography (ECC) by using a pairing function. The two algorithms are based on using two pairing functions, which are the Cantor pairing function and the Elegant
Sarah Hatem Namous   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy