Results 81 to 90 of about 12,967 (325)

Certificateless short sequential and broadcast multisignature schemes using elliptic curve bilinear pairings

open access: yesJournal of King Saud University: Computer and Information Sciences, 2014
Several certificateless short signature and multisignature schemes based on traditional public key infrastructure (PKI) or identity-based cryptosystem (IBC) have been proposed in the literature; however, no certificateless short sequential (or serial ...
SK Hafizul Islam, G.P. Biswas
doaj   +1 more source

Ubic: Bridging the gap between digital cryptography and the physical world

open access: yes, 2014
Advances in computing technology increasingly blur the boundary between the digital domain and the physical world. Although the research community has developed a large number of cryptographic primitives and has demonstrated their usability in all ...
D.M. Freeman   +6 more
core   +1 more source

CDK11 inhibition induces cytoplasmic p21WAF1 splice variant by p53 stabilisation and SF3B1 inactivation

open access: yesMolecular Oncology, EarlyView.
CDK11 inhibition stabilises the tumour suppressor p53 and triggers the production of an alternative p21WAF1 splice variant p21L, through the inactivation of the spliceosomal protein SF3B1. Unlike the canonical p21WAF1 protein, p21L is localised in the cytoplasm and has reduced cell cycle‐blocking activity.
Radovan Krejcir   +12 more
wiley   +1 more source

Efficient and Provable Secure Pairing-Free Security-Mediated Identity-Based Identification Schemes

open access: yesThe Scientific World Journal, 2014
Security-mediated cryptography was first introduced by Boneh et al. in 2001. The main motivation behind security-mediated cryptography was the capability to allow instant revocation of a user’s secret key by necessitating the cooperation of a security ...
Ji-Jian Chin   +3 more
doaj   +1 more source

Reduced vascular leakage correlates with breast carcinoma T regulatory cell infiltration but not with metastatic propensity

open access: yesMolecular Oncology, EarlyView.
A mouse model for vascular normalization and a human breast cancer cohort were studied to understand the relationship between vascular leakage and tumor immune suppression. For this, endothelial and immune cell RNAseq, staining for vascular function, and immune cell profiling were employed.
Liqun He   +8 more
wiley   +1 more source

A Subexponential Algorithm for Evaluating Large Degree Isogenies

open access: yes, 2010
An isogeny between elliptic curves is an algebraic morphism which is a group homomorphism. Many applications in cryptography require evaluating large degree isogenies between elliptic curves efficiently. For ordinary curves of the same endomorphism ring,
Jao, David, Soukharev, Vladimir
core   +1 more source

Liquid biopsy epigenetics: establishing a molecular profile based on cell‐free DNA

open access: yesMolecular Oncology, EarlyView.
Cell‐free DNA (cfDNA) fragments in plasma from cancer patients carry epigenetic signatures reflecting their cells of origin. These epigenetic features include DNA methylation, nucleosome modifications, and variations in fragmentation. This review describes the biological properties of each feature and explores optimal strategies for harnessing cfDNA ...
Christoffer Trier Maansson   +2 more
wiley   +1 more source

Cloud Data Auditing Using Proofs of Retrievability

open access: yes, 2017
Cloud servers offer data outsourcing facility to their clients. A client outsources her data without having any copy at her end. Therefore, she needs a guarantee that her data are not modified by the server which may be malicious.
Ruj, Sushmita, Sengupta, Binanda
core   +1 more source

Intein‐based modular chimeric antigen receptor platform for specific CD19/CD20 co‐targeting

open access: yesMolecular Oncology, EarlyView.
CARtein is a modular CAR platform that uses split inteins to splice antigen‐recognition modules onto a universal signaling backbone, enabling precise, scarless assembly without re‐engineering signaling domains. Deployed here against CD19 and CD20 in B‐cell malignancies, the design supports flexible multi‐antigen targeting to boost T‐cell activation and
Pablo Gonzalez‐Garcia   +9 more
wiley   +1 more source

Shake well before use: Authentication based on Accelerometer Data [PDF]

open access: yes, 2007
Small, mobile devices without user interfaces, such as Bluetooth headsets, often need to communicate securely over wireless networks. Active attacks can only be prevented by authenticating wireless communication, which is problematic when devices do not ...
Gellersen, Hans, Mayrhofer, Rene
core   +1 more source

Home - About - Disclaimer - Privacy