Results 51 to 60 of about 507,576 (358)

LPKI - A Lightweight Public Key Infrastructure for the Mobile Environments

open access: yes, 2008
The non-repudiation as an essential requirement of many applications can be provided by the asymmetric key model. With the evolution of new applications such as mobile commerce, it is essential to provide secure and efficient solutions for the mobile ...
Beheshti, A. A., Toorani, M.
core   +3 more sources

Chemoresistome mapping in individual breast cancer patients unravels diversity in dynamic transcriptional adaptation

open access: yesMolecular Oncology, EarlyView.
This study used longitudinal transcriptomics and gene‐pattern classification to uncover patient‐specific mechanisms of chemotherapy resistance in breast cancer. Findings reveal preexisting drug‐tolerant states in primary tumors and diverse gene rewiring patterns across patients, converging on a few dysregulated functional modules. Despite receiving the
Maya Dadiani   +14 more
wiley   +1 more source

Tonic signaling of the B‐cell antigen‐specific receptor is a common functional hallmark in chronic lymphocytic leukemia cell phosphoproteomes at early disease stages

open access: yesMolecular Oncology, EarlyView.
B‐cell chronic lymphocytic leukemia (B‐CLL) and monoclonal B‐cell lymphocytosis (MBL) show altered proteomes and phosphoproteomes, analyzed using mass spectrometry, protein microarrays, and western blotting. Identifying 2970 proteins and 316 phosphoproteins, including 55 novel phosphopeptides, we reveal BCR and NF‐kβ/STAT3 signaling in disease ...
Paula Díez   +17 more
wiley   +1 more source

New approach to practical leakage-resilient public-key cryptography

open access: yesJournal of Mathematical Cryptology, 2020
We present a new approach to construct several leakage-resilient cryptographic primitives, including leakage-resilient public-key encryption (PKE) schemes, authenticated key exchange (AKE) protocols and low-latency key exchange (LLKE) protocols.
Chakraborty Suvradip   +2 more
doaj   +1 more source

A Design of Secure Communication Architecture Applying Quantum Cryptography

open access: yesJournal of Information Science Theory and Practice, 2022
Existing network cryptography systems are threatened by recent developments in quantum computing. For example, the Shor algorithm, which can be run on a quantum computer, is capable of overriding public key-based network cryptography systems in a short ...
Kyu-Seok Shim   +2 more
doaj   +1 more source

Using decision problems in public key cryptography [PDF]

open access: yes, 2007
There are several public key establishment protocols as well as complete public key cryptosystems based on allegedly hard problems from combinatorial (semi)group theory known by now.
Shpilrain, Vladimir, Zapata, Gabriel
core   +3 more sources

Detecting homologous recombination deficiency for breast cancer through integrative analysis of genomic data

open access: yesMolecular Oncology, EarlyView.
This study develops a semi‐supervised classifier integrating multi‐genomic data (1404 training/5893 validation samples) to improve homologous recombination deficiency (HRD) detection in breast cancer. Our method demonstrates prognostic value and predicts chemotherapy/PARP inhibitor sensitivity in HRD+ tumours.
Rong Zhu   +12 more
wiley   +1 more source

Comprehensive omics‐based classification system in adult patients with B‐cell acute lymphoblastic leukemia

open access: yesMolecular Oncology, EarlyView.
The COMBAT classification system, developed through multi‐omics integration, stratifies adult patients with B‐cell acute lymphoblastic leukemia(B‐ALL) into three molecular subtypes with distinct surface antigen patterns, immune landscape, methylation patterns, biological pathways and prognosis.
Yang Song   +11 more
wiley   +1 more source

Learning with Errors is easy with quantum samples

open access: yes, 2018
Learning with Errors is one of the fundamental problems in computational learning theory and has in the last years become the cornerstone of post-quantum cryptography.
Grilo, Alex B.   +2 more
core   +2 more sources

Genomics‐led approach to drug testing in models of undifferentiated pleomorphic sarcoma

open access: yesMolecular Oncology, EarlyView.
GA text Genomic data from undifferentiated pleomorphic sarcoma patients and preclinical models were used to inform a targeted drug screen. Selected compounds were tested in 2D and 3D cultures of UPS cell lines. A combination of trametinib and infigratinib was synergistic in the majority of UPS cell lines tested, which was further confirmed in an ex ...
Piotr J. Manasterski   +19 more
wiley   +1 more source

Home - About - Disclaimer - Privacy