Results 101 to 110 of about 405,500 (194)

On the Security of Certificateless Signature Schemes

open access: yesInternational Journal of Distributed Sensor Networks, 2013
Wireless Sensor Network (WSN) has proved its presence in various real time applications and hence the security of such embedded devices is a vital issue. Certificateless cryptography is one of the recent paradigms to provide security.
Gaurav Sharma, Suman Bala, Anil K. Verma
doaj   +1 more source

ShcD adaptor protein drives invasion of triple negative breast cancer cells by aberrant activation of EGFR signaling

open access: yesMolecular Oncology, EarlyView.
We identified adaptor protein ShcD as upregulated in triple‐negative breast cancer and found its expression to be correlated with reduced patient survival and increased invasion in cell models. Using a proteomic screen, we identified novel ShcD binding partners involved in EGFR signaling pathways.
Hayley R. Lau   +11 more
wiley   +1 more source

Inhibitor of DNA binding‐1 is a key regulator of cancer cell vasculogenic mimicry

open access: yesMolecular Oncology, EarlyView.
Elevated expression of transcriptional regulator inhibitor of DNA binding 1 (ID1) promoted cancer cell‐mediated vasculogenic mimicry (VM) through regulation of pro‐angiogenic and pro‐cancerous genes (e.g. VE‐cadherin (CDH5), TIE2, MMP9, DKK1). Higher ID1 expression also increased metastases to the lung and the liver.
Emma J. Thompson   +11 more
wiley   +1 more source

Cryptanalysis of Xinyu et al.'s NTRU-Lattice Based Key Exchange Protocol [PDF]

open access: yesarXiv, 2016
Xinyu et al. proposed a public key exchange protocol, which is based on the NTRU-lattice based cryptography. In this paper, we show how Xinyu et al.'s NTRU-KE: A lattice based key exchange protocol can be broken, under the assumption that a man-in-the middle attack is used for extracting private keys of users who participate in the key exchange ...
arxiv  

Tonic signaling of the B‐cell antigen‐specific receptor is a common functional hallmark in chronic lymphocytic leukemia cell phosphoproteomes at early disease stages

open access: yesMolecular Oncology, EarlyView.
B‐cell chronic lymphocytic leukemia (B‐CLL) and monoclonal B‐cell lymphocytosis (MBL) show altered proteomes and phosphoproteomes, analyzed using mass spectrometry, protein microarrays, and western blotting. Identifying 2970 proteins and 316 phosphoproteins, including 55 novel phosphopeptides, we reveal BCR and NF‐kβ/STAT3 signaling in disease ...
Paula Díez   +17 more
wiley   +1 more source

RSA: Dagli anni '70 al giorno d'oggi

open access: yesAtti della Accademia Peloritana dei Pericolanti : Classe di Scienze Fisiche, Matematiche e Naturali, 2006
In this note, after a brief historical excursus, we describe the revolution in cryptography of the 70es, due to the introduction of public key cryptography and the RSA algorithm. We also consider some contemporary applications of this algorithm.
Pellegrini, S
doaj   +1 more source

Identity based cryptography from bilinear pairings [PDF]

open access: yes, 2005
This report contains an overview of two related areas of research in cryptography which have been prolific in significant advances in recent years. The first of these areas is pairing based cryptography.
Barbosa, Manuel
core  

Beyond digital twins: the role of foundation models in enhancing the interpretability of multiomics modalities in precision medicine

open access: yesFEBS Open Bio, EarlyView.
This review highlights how foundation models enhance predictive healthcare by integrating advanced digital twin modeling with multiomics and biomedical data. This approach supports disease management, risk assessment, and personalized medicine, with the goal of optimizing health outcomes through adaptive, interpretable digital simulations, accessible ...
Sakhaa Alsaedi   +2 more
wiley   +1 more source

High-Performance NTRU Accelerator Using a Direct Memory Access Controller

open access: yesIEEE Access
NTRU is a well-established and widely used public-key cryptography. It has been standardized in IEEE Std1363.1 and X9.98, and its variant was submitted to the National Institute of Standards and Technology (NIST) post-quantum cryptography (PQC ...
Seon Bhin Kim   +2 more
doaj   +1 more source

Hidden Polynomial(s) Cryptosystems [PDF]

open access: yesarXiv, 2003
We propose public-key cryptosystems with public key a system of polynomial equations, algebraic or differential, and private key a single polynomial or a small-size ideal. We set up probabilistic encryption, signature, and signcryption protocols.
arxiv  

Home - About - Disclaimer - Privacy