Results 81 to 90 of about 3,410,070 (315)

Collusive Attacks to "Circle-Type" Multi-party Quantum Key Agreement Protocols [PDF]

open access: yesarXiv, 2016
We find that existing multi-party quantum key agreement (MQKA) protocols designed for fairness of the key are, in fact, unfair. Our analysis shows that these protocols are sensitive to collusive attacks; that is, dishonest participants can collaborate to predetermine the key without being detected.
arxiv  

Orthogonal-state-based protocols of quantum key agreement [PDF]

open access: yes, 2013
Two orthogonal-state-based protocols of quantum key agreement (QKA) are proposed. The first protocol of QKA proposed here is designed for two-party QKA, whereas the second protocol is designed for multi-party QKA. Security of these orthogonal-state-based protocols arise from monogamy of entanglement. This is in contrast to the existing protocols of QKA
arxiv   +1 more source

On‐treatment dynamics of circulating extracellular vesicles in the first‐line setting of patients with advanced non‐small cell lung cancer: the LEXOVE prospective study

open access: yesMolecular Oncology, EarlyView.
The LEXOVE prospective study evaluated plasma cell‐free extracellular vesicle (cfEV) dynamics using Bradford assay and dynamic light scattering in metastatic non‐small cell lung cancer patients undergoing first‐line treatments, correlating a ∆cfEV < 20% with improved median progression‐free survival in responders versus non‐responders.
Valerio Gristina   +17 more
wiley   +1 more source

Cellular liquid biopsy provides unique chances for disease monitoring, preclinical model generation and therapy adjustment in rare salivary gland cancer patients

open access: yesMolecular Oncology, EarlyView.
We quantified and cultured circulating tumor cells (CTCs) of 62 patients with various cancer types and generated CTC‐derived tumoroid models from two salivary gland cancer patients. Cellular liquid biopsy‐derived information enabled molecular genetic assessment of systemic disease heterogeneity and functional testing for therapy selection in both ...
Nataša Stojanović Gužvić   +31 more
wiley   +1 more source

CytoResc – “CytoSorb” Rescue for critically ill patients undergoing the COVID-19 Cytokine Storm: A structured summary of a study protocol for a randomized controlled trial

open access: yesTrials, 2020
Objectives Approximately 8 - 10 % of COVID-19 patients present with a serious clinical course and need for hospitalization, 8% of hospitalized patients need ICU-treatment. Currently, no causal therapy is available and treatment is purely supportive.
Helena Stockmann   +14 more
doaj   +1 more source

Timed Analysis of Security Protocols [PDF]

open access: yesarXiv, 2005
We propose a method for engineering security protocols that are aware of timing aspects. We study a simplified version of the well-known Needham Schroeder protocol and the complete Yahalom protocol, where timing information allows the study of different attack scenarios. We model check the protocols using UPPAAL.
arxiv  

Targeting rapid TKI‐induced AXL upregulation overcomes adaptive ERK reactivation and exerts antileukemic effects in FLT3/ITD acute myeloid leukemia

open access: yesMolecular Oncology, EarlyView.
Adaptive ERK reactivation hinders FLT3 tyrosine kinase inhibitor (TKI) treatment in FLT3/ITD acute myeloid leukemia. Here, we report that FLT3 TKI treatment rapidly induces AXL expression and upregulation that is temporally associated with the adaptive ERK reactivation.
Tessa S. Seale   +9 more
wiley   +1 more source

A framework for compositional verification of security protocols [PDF]

open access: yesarXiv, 2006
Automatic security protocol analysis is currently feasible only for small protocols. Since larger protocols quite often are composed of many small protocols, compositional analysis is an attractive, but non-trivial approach. We have developed a framework for compositional analysis of a large class of security protocols.
arxiv  

Circulating tumor DNA (ctDNA) trajectories predict survival in trifluridine/tipiracil‐treated metastatic colorectal cancer patients

open access: yesMolecular Oncology, EarlyView.
The authors applied joint/mixed models that predict mortality of trifluridine/tipiracil‐treated metastatic colorectal cancer patients based on circulating tumor DNA (ctDNA) trajectories. Patients at high risk of death could be spared aggressive therapy with the prospect of a higher quality of life in their remaining lifetime, whereas patients with a ...
Matthias Unseld   +7 more
wiley   +1 more source

On the Relations Between Diffie-Hellman and ID-Based Key Agreement from Pairings [PDF]

open access: yesarXiv, 2009
This paper studies the relationships between the traditional Diffie-Hellman key agreement protocol and the identity-based (ID-based) key agreement protocol from pairings. For the Sakai-Ohgishi-Kasahara (SOK) ID-based key construction, we show that identical to the Diffie-Hellman protocol, the SOK key agreement protocol also has three variants, namely
arxiv  

Home - About - Disclaimer - Privacy