Results 61 to 70 of about 493,090 (289)

When Those With Privacy Concerns Show Stronger In-Group Favoritism: Using Personal Information From In-Group and Out-Group Members to Identify Terrorist Threats

open access: yesSAGE Open, 2023
Terrorist threats and attacks provide major risks and sources of public crises in the 21st century. New probabilistic computing technologies possess the capability of increasing the success of identifying terrorist threats and solving cybersecurity and ...
Torsten Reimer, Nathanael Johnson
doaj   +1 more source

Fiddling the Twiddle Constants - Fault Injection Analysis of the Number Theoretic Transform

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
In this work, we present the first fault injection analysis of the Number Theoretic Transform (NTT). The NTT is an integral computation unit, widely used for polynomial multiplication in several structured lattice-based key encapsulation mechanisms ...
Prasanna Ravi   +4 more
doaj   +1 more source

Probabilistic Public Key Encryption with Equality Test

open access: yes, 2010
We present a (probabilistic) public key encryption (PKE) scheme such that when being implemented in a bilinear group, anyone is able to check whether two ciphertexts are encryptions of the same message. Interestingly, bilinear map operations are not required in key generation, encryption or decryption procedures of the PKE scheme, but is only required ...
YANG, Guomin   +3 more
openaire   +2 more sources

Decrypting cancer's spatial code: from single cells to tissue niches

open access: yesMolecular Oncology, EarlyView.
Spatial transcriptomics maps gene activity across tissues, offering powerful insights into how cancer cells are organised, switch states and interact with their surroundings. This review outlines emerging computational, artificial intelligence (AI) and geospatial approaches to define cell states, uncover tumour niches and integrate spatial data with ...
Cenk Celik   +4 more
wiley   +1 more source

Public Key Protocols from Twisted-Skew Group Rings

open access: yesCryptography
This article studies some algebraic structures known as twisted-skew group rings in the context of public key cryptography. We first present some background related to these structures to then specifically introduce particular twisted-skew group rings ...
Javier de la Cruz   +3 more
doaj   +1 more source

An efficient and secure protocol for checking remote data integrity in multi-cloud environment

open access: yesScientific Reports, 2021
In cloud environment, huge quantity of data has been generated at each and every second. In order to manage the data, cloud service provider makes use of multi-cloud platform to fulfill the requirement.
H. Anwarbasha   +2 more
doaj   +1 more source

Random Differential Fault Attacks on the Lightweight Authenticated Encryption Stream Cipher Grain-128AEAD

open access: yesIEEE Access, 2021
Grain-128AEAD is a lightweight authenticated encryption stream cipher and one of the finalists in the National Institute of Standards and Technology (NIST) Lightweight Cryptography (LWC) project. This paper provides an independent third-party analysis of
Iftekhar Salam   +5 more
doaj   +1 more source

Characterizing the salivary RNA landscape to identify potential diagnostic, prognostic, and follow‐up biomarkers for breast cancer

open access: yesMolecular Oncology, EarlyView.
This study explores salivary RNA for breast cancer (BC) diagnosis, prognosis, and follow‐up. High‐throughput RNA sequencing identified distinct salivary RNA signatures, including novel transcripts, that differentiate BC from healthy controls, characterize histological and molecular subtypes, and indicate lymph node involvement.
Nicholas Rajan   +9 more
wiley   +1 more source

Predictors of response and rational combinations for the novel MCL‐1 inhibitor MIK665 in acute myeloid leukemia

open access: yesMolecular Oncology, EarlyView.
This study characterizes the responses of primary acute myeloid leukemia (AML) patient samples to the MCL‐1 inhibitor MIK665. The results revealed that monocytic differentiation is associated with MIK665 sensitivity. Conversely, elevated ABCB1 expression is a potential biomarker of resistance to the treatment, which can be overcome by the combination ...
Joseph Saad   +17 more
wiley   +1 more source

The IFNγ‐CIITA‐MHC II axis modulates melanoma cell susceptibility to NK‐cell‐mediated cytotoxicity

open access: yesMolecular Oncology, EarlyView.
Natural killer (NK) cells play a central role in anti‐melanoma immunity. However, melanoma cells adapt during co‐culture by upregulating CIITA and MHC II in response to interferon gamma (IFNγ), thereby evading NK‐cell lysis. Blocking IFNγ signaling or treatment with dimethyl fumarate/simvastatin counteracts this immune escape and maintains NK‐cell ...
Lena C. M. Krause   +6 more
wiley   +1 more source

Home - About - Disclaimer - Privacy