Results 51 to 60 of about 493,090 (289)

Novel channel-hopping pattern-based wireless IoT networks in smart cities for reducing multi-access interference and jamming attacks

open access: yesEURASIP Journal on Wireless Communications and Networking, 2021
In smart cities, the Internet-of-Thing (IoT) provides an enabling communication infrastructure to support tremendous amount of data exchange. Most IoT applications, e.g., wireless local area network, Bluetooth and so forth, utilize the channel-hopping ...
Yiming Liu   +4 more
doaj   +1 more source

Probabilistic encryption key exchange

open access: yesElectronics Letters, 1995
A novel secret key exchange algorithm is proposed. It is based on the properties of the Blum Blum and Shum pseudo-random number generator (the 'x/sup 2/ modN' generator), and on partial disclosure of the secret seed for this generator. The security and other features of the proposed cryptosystem are discussed.
openaire   +2 more sources

Detecting homologous recombination deficiency for breast cancer through integrative analysis of genomic data

open access: yesMolecular Oncology, EarlyView.
This study develops a semi‐supervised classifier integrating multi‐genomic data (1404 training/5893 validation samples) to improve homologous recombination deficiency (HRD) detection in breast cancer. Our method demonstrates prognostic value and predicts chemotherapy/PARP inhibitor sensitivity in HRD+ tumours.
Rong Zhu   +12 more
wiley   +1 more source

Software encryption: new 64-bit block cryptoscheme [PDF]

open access: yesComputer Science Journal of Moldova, 1997
There are considered new fast software encryption function and some its cryptographical properties. It has been shown that the probability of the selection of two equivalent keys is very low.
A. Moldovyan, N. Moldovyan, V. Izbash
doaj  

Data‐driven discovery of gene expression markers distinguishing pediatric acute lymphoblastic leukemia subtypes

open access: yesMolecular Oncology, EarlyView.
This study investigates gene expression differences between two major pediatric acute lymphoblastic leukemia (ALL) subtypes, B‐cell precursor ALL, and T‐cell ALL, using a data‐driven approach consisting of biostatistics and machine learning methods. Following analysis of a discovery dataset, we find a set of 14 expression markers differentiating the ...
Mona Nourbakhsh   +8 more
wiley   +1 more source

Integrative miRNOMe profiling reveals the miR‐195‐5p–CHEK1 axis and its impact on luminal breast cancer outcomes

open access: yesMolecular Oncology, EarlyView.
In luminal (ER+) breast carcinoma (BC), miRNA profiling identified miR‐195‐5p as a key regulator of proliferation that targets CHEK1, CDC25A, and CCNE1. High CHEK1 expression correlates with worse relapse‐free survival after chemotherapy, especially in patients with luminal A subtype.
Veronika Boušková   +14 more
wiley   +1 more source

Signcryption schemes with insider security in an ideal permutation model

open access: yesJournal of Mathematical Cryptology, 2019
Signcryption aims to provide both confidentiality and authentication of messages more efficiently than performing encryption and signing independently. The “Commit-then-Sign & Encrypt” (CtS&E) method allows to perform encryption and signing in parallel ...
Bansal Tarun Kumar   +2 more
doaj   +1 more source

Onboard disease prediction and rehabilitation monitoring on secure edge-cloud integrated privacy preserving healthcare system

open access: yesEgyptian Informatics Journal, 2021
Edge-based privacy preserving cryptosystem is identified as the upcoming amenities of cloud-based secure remote healthcare monitoring systems. Usually, the cloud-based healthcare system will directly collect the remote patient data through a sensor layer
Ramaprabha Jayaram, S. Prabakaran
doaj   +1 more source

Unveiling unique protein and phosphorylation signatures in lung adenocarcinomas with and without ALK, EGFR, and KRAS genetic alterations

open access: yesMolecular Oncology, EarlyView.
Proteomic and phosphoproteomic analyses were performed on lung adenocarcinoma (LUAD) tumors with EGFR, KRAS, or EML4–ALK alterations and wild‐type cases. Distinct protein expression and phosphorylation patterns were identified, especially in EGFR‐mutated tumors. Key altered pathways included vesicle transport and RNA splicing.
Fanni Bugyi   +12 more
wiley   +1 more source

CCA1 secure FHE from PIO, revisited

open access: yesCybersecurity, 2018
Fully data using only public information. So far, most FHE schemes are CPA secure. In PKC 2017, Canetti et al. extended the generic transformation of Boneh, Canetti, Halevi and Katz to turn any multi-key identity-based FHE scheme into a CCA1-secure FHE ...
Biao Wang, Xueqing Wang, Rui Xue
doaj   +1 more source

Home - About - Disclaimer - Privacy