Results 51 to 60 of about 521,705 (324)

Patient‐specific pharmacogenomics demonstrates xCT as predictive therapeutic target in colon cancer with possible implications in tumor connectivity

open access: yesMolecular Oncology, EarlyView.
This study integrates transcriptomic profiling of matched tumor and healthy tissues from 32 colorectal cancer patients with functional validation in patient‐derived organoids, revealing dysregulated metabolic programs driven by overexpressed xCT (SLC7A11) and SLC3A2, identifying an oncogenic cystine/glutamate transporter signature linked to ...
Marco Strecker   +16 more
wiley   +1 more source

Quantum asymmetric cryptography with symmetric keys

open access: yes, 2008
Based on quantum encryption, we present a new idea for quantum public-key cryptography (QPKC) and construct a whole theoretical framework of a QPKC system.
A. Kawachi   +41 more
core   +1 more source

Predictors of response and rational combinations for the novel MCL‐1 inhibitor MIK665 in acute myeloid leukemia

open access: yesMolecular Oncology, EarlyView.
This study characterizes the responses of primary acute myeloid leukemia (AML) patient samples to the MCL‐1 inhibitor MIK665. The results revealed that monocytic differentiation is associated with MIK665 sensitivity. Conversely, elevated ABCB1 expression is a potential biomarker of resistance to the treatment, which can be overcome by the combination ...
Joseph Saad   +17 more
wiley   +1 more source

Aggressive prostate cancer is associated with pericyte dysfunction

open access: yesMolecular Oncology, EarlyView.
Tumor‐produced TGF‐β drives pericyte dysfunction in prostate cancer. This dysfunction is characterized by downregulation of some canonical pericyte markers (i.e., DES, CSPG4, and ACTA2) while maintaining the expression of others (i.e., PDGFRB, NOTCH3, and RGS5).
Anabel Martinez‐Romero   +11 more
wiley   +1 more source

Learning with Errors is easy with quantum samples

open access: yes, 2018
Learning with Errors is one of the fundamental problems in computational learning theory and has in the last years become the cornerstone of post-quantum cryptography.
Grilo, Alex B.   +2 more
core   +2 more sources

Screening for lung cancer: A systematic review of overdiagnosis and its implications

open access: yesMolecular Oncology, EarlyView.
Low‐dose computed tomography (CT) screening for lung cancer may increase overdiagnosis compared to no screening, though the risk is likely low versus chest X‐ray. Our review of 8 trials (84 660 participants) shows added costs. Further research with strict adherence to modern nodule management strategies may help determine the extent to which ...
Fiorella Karina Fernández‐Sáenz   +12 more
wiley   +1 more source

A New Class of Strongly Asymmetric PKA Algorithms: SAA-5

open access: yesCryptography, 2019
A new class of public key agreement (PKA) algorithms called strongly-asymmetric algorithms (SAA) was introduced in a previous paper by some of the present authors.
Luigi Accardi   +3 more
doaj   +1 more source

Cryptanalysis and improvement of an efficient certificateless signature scheme

open access: yes, 2008
In traditional digital signature schemes, certificates signed by a trusted party are required to ensure the authenticity of the public key. In Asiacrypt 2003, the concept of certificateless signature scheme was introduced.
Huang, Xinyi, Li, Jiguo, Mu, Yi, Wu, Wei
core   +1 more source

Improving PARP inhibitor efficacy in bladder cancer without genetic BRCAness by combination with PLX51107

open access: yesMolecular Oncology, EarlyView.
Clinical trials on PARP inhibitors in urothelial carcinoma (UC) showed limited efficacy and a lack of predictive biomarkers. We propose SLFN5, SLFN11, and OAS1 as UC‐specific response predictors. We suggest Talazoparib as the better PARP inhibitor for UC than Olaparib.
Jutta Schmitz   +15 more
wiley   +1 more source

Leakage-Resilient Certificate-Based Signature Resistant to Side-Channel Attacks

open access: yesIEEE Access, 2019
Certificate-based cryptography is an attractive public-key setting, and it not only simplifies certificate management in the traditional public-key cryptography but also eliminates the key escrow problem inherent in the identity-based cryptography ...
Jui-Di Wu   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy