Results 71 to 80 of about 12,967 (325)

Certificateless Blind Signature Based on DLP [PDF]

open access: yes, 2015
The most widely used digital signature in the real word application such as e cash e-voting etc. is blind signature. Previously the proposed blind signature follow the foot steps of public key cryptography(PKC) but conventional public key cryptography ...
Kumar, Samir
core  

Emerging role of ARHGAP29 in melanoma cell phenotype switching

open access: yesMolecular Oncology, EarlyView.
This study gives first insights into the role of ARHGAP29 in malignant melanoma. ARHGAP29 was revealed to be connected to tumor cell plasticity, promoting a mesenchymal‐like, invasive phenotype and driving tumor progression. Further, it modulates cell spreading by influencing RhoA/ROCK signaling and affects SMAD2 activity. Rho GTPase‐activating protein
Beatrice Charlotte Tröster   +3 more
wiley   +1 more source

Patient‐specific pharmacogenomics demonstrates xCT as predictive therapeutic target in colon cancer with possible implications in tumor connectivity

open access: yesMolecular Oncology, EarlyView.
This study integrates transcriptomic profiling of matched tumor and healthy tissues from 32 colorectal cancer patients with functional validation in patient‐derived organoids, revealing dysregulated metabolic programs driven by overexpressed xCT (SLC7A11) and SLC3A2, identifying an oncogenic cystine/glutamate transporter signature linked to ...
Marco Strecker   +16 more
wiley   +1 more source

Acoustic Fingerprints for Access Management in Ad-Hoc Sensor Networks

open access: yesIEEE Access, 2020
Voice user interfaces can offer intuitive interaction with our devices, but the usability and audio quality could be further improved if multiple devices could collaborate to provide a distributed voice user interface.
Pablo Perez Zarazaga   +2 more
doaj   +1 more source

Predictors of response and rational combinations for the novel MCL‐1 inhibitor MIK665 in acute myeloid leukemia

open access: yesMolecular Oncology, EarlyView.
This study characterizes the responses of primary acute myeloid leukemia (AML) patient samples to the MCL‐1 inhibitor MIK665. The results revealed that monocytic differentiation is associated with MIK665 sensitivity. Conversely, elevated ABCB1 expression is a potential biomarker of resistance to the treatment, which can be overcome by the combination ...
Joseph Saad   +17 more
wiley   +1 more source

Distortion maps for supersingular genus two curves

open access: yesJournal of Mathematical Cryptology, 2009
Distortion maps are a useful tool for pairing based cryptography. Compared with elliptic curves, the case of hyperelliptic curves of genus g > 1 is more complicated, since the full torsion subgroup has rank 2g.
Galbraith Steven D.   +3 more
doaj   +1 more source

A pairing-free identity-based two-party authenticated key agreement protocol for secure and efficient communication

open access: yesJournal of King Saud University: Computer and Information Sciences, 2017
Recently, many identity-based two-party authenticated key agreement (ID-2PAKA) protocols using elliptic curve cryptography (ECC) have been proposed, however, these protocols do not provide adequate security and their computation costs are also relatively
SK Hafizul Islam, G.P. Biswas
doaj   +1 more source

Analysis of Error Impact for Batch Handover Authentication Protocols in Mobile Wireless Networks

open access: yesIEEE Access, 2020
The handover authentication protocol controls the access of multiple access points in a mobile wireless network (MWN). PairHand is a handover authentication protocol that uses identity-based public key cryptography based on bilinear pairing and provides ...
Younsoo Park, Ho-Hyun Park
doaj   +1 more source

Aggressive prostate cancer is associated with pericyte dysfunction

open access: yesMolecular Oncology, EarlyView.
Tumor‐produced TGF‐β drives pericyte dysfunction in prostate cancer. This dysfunction is characterized by downregulation of some canonical pericyte markers (i.e., DES, CSPG4, and ACTA2) while maintaining the expression of others (i.e., PDGFRB, NOTCH3, and RGS5).
Anabel Martinez‐Romero   +11 more
wiley   +1 more source

The monodromy pairing and discrete logarithm on the Jacobian of finite graphs

open access: yesJournal of Mathematical Cryptology, 2010
Every graph has a canonical finite abelian group attached to it. This group has appeared in the literature under a variety of names including the sandpile group, critical group, Jacobian group, and Picard group.
Shokrieh Farbod
doaj   +1 more source

Home - About - Disclaimer - Privacy