Results 51 to 60 of about 507,576 (358)
LPKI - A Lightweight Public Key Infrastructure for the Mobile Environments
The non-repudiation as an essential requirement of many applications can be provided by the asymmetric key model. With the evolution of new applications such as mobile commerce, it is essential to provide secure and efficient solutions for the mobile ...
Beheshti, A. A., Toorani, M.
core +3 more sources
This study used longitudinal transcriptomics and gene‐pattern classification to uncover patient‐specific mechanisms of chemotherapy resistance in breast cancer. Findings reveal preexisting drug‐tolerant states in primary tumors and diverse gene rewiring patterns across patients, converging on a few dysregulated functional modules. Despite receiving the
Maya Dadiani +14 more
wiley +1 more source
B‐cell chronic lymphocytic leukemia (B‐CLL) and monoclonal B‐cell lymphocytosis (MBL) show altered proteomes and phosphoproteomes, analyzed using mass spectrometry, protein microarrays, and western blotting. Identifying 2970 proteins and 316 phosphoproteins, including 55 novel phosphopeptides, we reveal BCR and NF‐kβ/STAT3 signaling in disease ...
Paula Díez +17 more
wiley +1 more source
New approach to practical leakage-resilient public-key cryptography
We present a new approach to construct several leakage-resilient cryptographic primitives, including leakage-resilient public-key encryption (PKE) schemes, authenticated key exchange (AKE) protocols and low-latency key exchange (LLKE) protocols.
Chakraborty Suvradip +2 more
doaj +1 more source
A Design of Secure Communication Architecture Applying Quantum Cryptography
Existing network cryptography systems are threatened by recent developments in quantum computing. For example, the Shor algorithm, which can be run on a quantum computer, is capable of overriding public key-based network cryptography systems in a short ...
Kyu-Seok Shim +2 more
doaj +1 more source
Using decision problems in public key cryptography [PDF]
There are several public key establishment protocols as well as complete public key cryptosystems based on allegedly hard problems from combinatorial (semi)group theory known by now.
Shpilrain, Vladimir, Zapata, Gabriel
core +3 more sources
This study develops a semi‐supervised classifier integrating multi‐genomic data (1404 training/5893 validation samples) to improve homologous recombination deficiency (HRD) detection in breast cancer. Our method demonstrates prognostic value and predicts chemotherapy/PARP inhibitor sensitivity in HRD+ tumours.
Rong Zhu +12 more
wiley +1 more source
The COMBAT classification system, developed through multi‐omics integration, stratifies adult patients with B‐cell acute lymphoblastic leukemia(B‐ALL) into three molecular subtypes with distinct surface antigen patterns, immune landscape, methylation patterns, biological pathways and prognosis.
Yang Song +11 more
wiley +1 more source
Learning with Errors is easy with quantum samples
Learning with Errors is one of the fundamental problems in computational learning theory and has in the last years become the cornerstone of post-quantum cryptography.
Grilo, Alex B. +2 more
core +2 more sources
Genomics‐led approach to drug testing in models of undifferentiated pleomorphic sarcoma
GA text Genomic data from undifferentiated pleomorphic sarcoma patients and preclinical models were used to inform a targeted drug screen. Selected compounds were tested in 2D and 3D cultures of UPS cell lines. A combination of trametinib and infigratinib was synergistic in the majority of UPS cell lines tested, which was further confirmed in an ex ...
Piotr J. Manasterski +19 more
wiley +1 more source

