Results 51 to 60 of about 493,090 (289)
In smart cities, the Internet-of-Thing (IoT) provides an enabling communication infrastructure to support tremendous amount of data exchange. Most IoT applications, e.g., wireless local area network, Bluetooth and so forth, utilize the channel-hopping ...
Yiming Liu +4 more
doaj +1 more source
Probabilistic encryption key exchange
A novel secret key exchange algorithm is proposed. It is based on the properties of the Blum Blum and Shum pseudo-random number generator (the 'x/sup 2/ modN' generator), and on partial disclosure of the secret seed for this generator. The security and other features of the proposed cryptosystem are discussed.
openaire +2 more sources
This study develops a semi‐supervised classifier integrating multi‐genomic data (1404 training/5893 validation samples) to improve homologous recombination deficiency (HRD) detection in breast cancer. Our method demonstrates prognostic value and predicts chemotherapy/PARP inhibitor sensitivity in HRD+ tumours.
Rong Zhu +12 more
wiley +1 more source
Software encryption: new 64-bit block cryptoscheme [PDF]
There are considered new fast software encryption function and some its cryptographical properties. It has been shown that the probability of the selection of two equivalent keys is very low.
A. Moldovyan, N. Moldovyan, V. Izbash
doaj
This study investigates gene expression differences between two major pediatric acute lymphoblastic leukemia (ALL) subtypes, B‐cell precursor ALL, and T‐cell ALL, using a data‐driven approach consisting of biostatistics and machine learning methods. Following analysis of a discovery dataset, we find a set of 14 expression markers differentiating the ...
Mona Nourbakhsh +8 more
wiley +1 more source
In luminal (ER+) breast carcinoma (BC), miRNA profiling identified miR‐195‐5p as a key regulator of proliferation that targets CHEK1, CDC25A, and CCNE1. High CHEK1 expression correlates with worse relapse‐free survival after chemotherapy, especially in patients with luminal A subtype.
Veronika Boušková +14 more
wiley +1 more source
Signcryption schemes with insider security in an ideal permutation model
Signcryption aims to provide both confidentiality and authentication of messages more efficiently than performing encryption and signing independently. The “Commit-then-Sign & Encrypt” (CtS&E) method allows to perform encryption and signing in parallel ...
Bansal Tarun Kumar +2 more
doaj +1 more source
Edge-based privacy preserving cryptosystem is identified as the upcoming amenities of cloud-based secure remote healthcare monitoring systems. Usually, the cloud-based healthcare system will directly collect the remote patient data through a sensor layer
Ramaprabha Jayaram, S. Prabakaran
doaj +1 more source
Proteomic and phosphoproteomic analyses were performed on lung adenocarcinoma (LUAD) tumors with EGFR, KRAS, or EML4–ALK alterations and wild‐type cases. Distinct protein expression and phosphorylation patterns were identified, especially in EGFR‐mutated tumors. Key altered pathways included vesicle transport and RNA splicing.
Fanni Bugyi +12 more
wiley +1 more source
CCA1 secure FHE from PIO, revisited
Fully data using only public information. So far, most FHE schemes are CPA secure. In PKC 2017, Canetti et al. extended the generic transformation of Boneh, Canetti, Halevi and Katz to turn any multi-key identity-based FHE scheme into a CCA1-secure FHE ...
Biao Wang, Xueqing Wang, Rui Xue
doaj +1 more source

