Results 71 to 80 of about 529,456 (364)

Exploration of heterogeneity and recurrence signatures in hepatocellular carcinoma

open access: yesMolecular Oncology, EarlyView.
This study leveraged public datasets and integrative bioinformatic analysis to dissect malignant cell heterogeneity between relapsed and primary HCC, focusing on intercellular communication, differentiation status, metabolic activity, and transcriptomic profiles.
Wen‐Jing Wu   +15 more
wiley   +1 more source

The atypical KRASQ22K mutation directs TGF‐β response towards partial epithelial‐to‐mesenchymal transition in patient‐derived colorectal cancer tumoroids

open access: yesMolecular Oncology, EarlyView.
TGF‐β has a complex role in cancer, exhibiting both tumor‐suppressive and tumor‐promoting properties. Using a series of differentiated tumoroids, derived from different stages and mutational background of colorectal cancer patients, we replicate this duality of TGF‐β in vitro. Notably, the atypical but highly aggressive KRASQ22K mutation rendered early‐
Theresia Mair   +17 more
wiley   +1 more source

A New Class of Strongly Asymmetric PKA Algorithms: SAA-5

open access: yesCryptography, 2019
A new class of public key agreement (PKA) algorithms called strongly-asymmetric algorithms (SAA) was introduced in a previous paper by some of the present authors.
Luigi Accardi   +3 more
doaj   +1 more source

LPKI - A Lightweight Public Key Infrastructure for the Mobile Environments

open access: yes, 2008
The non-repudiation as an essential requirement of many applications can be provided by the asymmetric key model. With the evolution of new applications such as mobile commerce, it is essential to provide secure and efficient solutions for the mobile ...
Beheshti, A. A., Toorani, M.
core   +3 more sources

A large‐scale retrospective study in metastatic breast cancer patients using circulating tumour DNA and machine learning to predict treatment outcome and progression‐free survival

open access: yesMolecular Oncology, EarlyView.
There is an unmet need in metastatic breast cancer patients to monitor therapy response in real time. In this study, we show how a noninvasive and affordable strategy based on sequencing of plasma samples with longitudinal tracking of tumour fraction paired with a statistical model provides valuable information on treatment response in advance of the ...
Emma J. Beddowes   +20 more
wiley   +1 more source

IMPLEMENTATION OF BLOM’S KEY PREDISTRIBUTION SCHEME BY USING ELLIPTIC CURVE CRYPTOGRAPHY

open access: yesMalaysian Journal of Computing, 2021
Cryptography, along with its various methods is used to serve the security communication purpose. Cryptography is said to be secure if the encryption key is hard to break by the attacker.
Md Nizam Udin   +5 more
doaj   +1 more source

A Practical Analysis of the Fermat Factorization and Pollard Rho Method for Factoring Integers

open access: yesLontar Komputer, 2021
The development of public-key cryptography generation using the factoring method is very important in practical cryptography applications. In cryptographic applications, the urgency of factoring is very risky because factoring can crack public and ...
Aminudin Aminudin, Eko Budi Cahyono
doaj   +1 more source

Escape from TGF‐β‐induced senescence promotes aggressive hallmarks in epithelial hepatocellular carcinoma cells

open access: yesMolecular Oncology, EarlyView.
Chronic TGF‐β exposure drives epithelial HCC cells from a senescent state to a TGF‐β resistant mesenchymal phenotype. This transition is characterized by the loss of Smad3‐mediated signaling, escape from senescence, enhanced invasiveness and metastatic potential, and upregulation of key resistance modulators such as MARK1 and GRM8, ultimately promoting
Minenur Kalyoncu   +11 more
wiley   +1 more source

Inverse matrices with applications in public-key cryptography

open access: yesJournal of Algorithms & Computational Technology
The applications of non-square binary matrices span many domains including mathematics, error-correction coding, machine learning, data storage, navigation signals, and cryptography.
Farshid Haidary Makoui   +1 more
doaj   +1 more source

ShcD adaptor protein drives invasion of triple negative breast cancer cells by aberrant activation of EGFR signaling

open access: yesMolecular Oncology, EarlyView.
We identified adaptor protein ShcD as upregulated in triple‐negative breast cancer and found its expression to be correlated with reduced patient survival and increased invasion in cell models. Using a proteomic screen, we identified novel ShcD binding partners involved in EGFR signaling pathways.
Hayley R. Lau   +11 more
wiley   +1 more source

Home - About - Disclaimer - Privacy