Results 41 to 50 of about 158,618 (286)

Tumor mutational burden as a determinant of metastatic dissemination patterns

open access: yesMolecular Oncology, EarlyView.
This study performed a comprehensive analysis of genomic data to elucidate whether metastasis in certain organs share genetic characteristics regardless of cancer type. No robust mutational patterns were identified across different metastatic locations and cancer types.
Eduardo Candeal   +4 more
wiley   +1 more source

Predicting and Comparing the Subjective Health Experience of Older Cancer Survivors and Non‐Cancer Survivors: A Modeling Approach

open access: yesAging and Cancer, EarlyView.
This study underscores the significant influence of frailty and vitality on the subjective health experience of older cancer survivors with acceptance and control emerging as salient mediators. These findings affirm the conceptual and empirical robustness of the model highlighting its potential utility in shaping future interventions for older cancer ...
Damien S. E. Broekharst   +4 more
wiley   +1 more source

ID-based efficient and proactive threshold proxy signature in the standard model

open access: yesTongxin xuebao, 2011
The security of existing identity-based threshold proxy signature schemes were almost proven in the random oracle model,and each proxy signer’s proxy signature key was fixed in the valid period.A(t,n) ID-based proactive threshold proxy signature scheme ...
YU Yi-ke1, ZHENG Xue-feng2
doaj   +2 more sources

Reverse Proxy Framework using Sanitization Technique for Intrusion Prevention in Database

open access: yes, 2013
With the increasing importance of the internet in our day to day life, data security in web application has become very crucial. Ever increasing on line and real time transaction services have led to manifold rise in the problems associated with the ...
Chougule, Archana   +2 more
core   +1 more source

A Byzantine Fault-Tolerant Ordering Service for the Hyperledger Fabric Blockchain Platform [PDF]

open access: yes, 2017
Hyperledger Fabric (HLF) is a flexible permissioned blockchain platform designed for business applications beyond the basic digital coin addressed by Bitcoin and other existing networks.
Bessani, Alysson   +2 more
core   +1 more source

Tracking Motor Progression and Device‐Aided Therapy Eligibility in Parkinson's Disease

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective To characterise the progression of motor symptoms and identify eligibility for device‐aided therapies in Parkinson's disease, using both the 5‐2‐1 criteria and a refined clinical definition, while examining differences across genetic subgroups.
David Ledingham   +7 more
wiley   +1 more source

The McCance Brain Care Score and Mortality: Evidence From a Large‐Scale Population‐Based Cohort

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objectives This study aimed to examine the relationship between the McCance Brain Care Score (BCS) and mortality in the general population. Methods We conducted a prospective, population‐based cohort study using data from the UK Biobank. Participants with complete data enabling calculation of BCS and full mortality information were included ...
Zhiqiang Xu, Xiaoxiao Wang, Nan Li
wiley   +1 more source

Quantum Proxy Signature Scheme with Discrete Time Quantum Walks and Quantum One-Time Pad CNOT Operation

open access: yesApplied Sciences, 2020
The quantum proxy signature is one of the most significant formalisms in quantum signatures. We put forward a quantum proxy signature scheme using quantum walk-based teleportation and quantum one-time pad CNOT (QOTP-CNOT) operation, which includes four ...
Yanyan Feng   +4 more
doaj   +1 more source

A Survey on Proxy Re-Signature Schemes for Translating One Type of Signature to Another

open access: yesCybernetics and Information Technologies, 2021
Proxy Re-Signature (PRS) complements well-established digital signature service. Blaze-Bleumer-Strauss discussed PRS in 1998 for translating a signature on a message from Alice into a signature from Bob on the same message at semi-trusted proxy which ...
Chaudhari Shilpa   +2 more
doaj   +1 more source

Proxy Blind Signature using Hyperelliptic Curve Cryptography [PDF]

open access: yes, 2013
Blind signature is the concept to ensure anonymity of e-coins. Untracebility and unlinkability are two main properties of real coins and should also be mimicked electronically. A user has to fulll above two properties of blind signature for permission to
Pradhan, Srikanta
core  

Home - About - Disclaimer - Privacy