Results 51 to 60 of about 405,500 (194)

Public key cryptography and error correcting codes as Ising models

open access: yes, 2000
We employ the methods of statistical physics to study the performance of Gallager type error-correcting codes. In this approach, the transmitted codeword comprises Boolean sums of the original message bits selected by two randomly-constructed sparse ...
Kabashima, Yoshiyuki   +2 more
core   +1 more source

Pseudo Random Generator Based Public Key Cryptography [PDF]

open access: yes, 2017
Advances in communication technology have seen strong interest in digital data transmission. However, illegal data access has become more easy and prevalent in wireless and general communication networks.
Bhatia, K. (Kirti), Saini, N. (Neha)
core   +1 more source

Cellular liquid biopsy provides unique chances for disease monitoring, preclinical model generation and therapy adjustment in rare salivary gland cancer patients

open access: yesMolecular Oncology, EarlyView.
We quantified and cultured circulating tumor cells (CTCs) of 62 patients with various cancer types and generated CTC‐derived tumoroid models from two salivary gland cancer patients. Cellular liquid biopsy‐derived information enabled molecular genetic assessment of systemic disease heterogeneity and functional testing for therapy selection in both ...
Nataša Stojanović Gužvić   +31 more
wiley   +1 more source

Applications of single-qubit rotations in quantum public-key cryptography

open access: yes, 2008
We discuss cryptographic applications of single-qubit rotations from the perspective of trapdoor one-way functions and public-key encryption. In particular, we present an asymmetric cryptosystem whose security relies on fundamental principles of quantum ...
A. Kawachi   +3 more
core   +1 more source

Replenishing co‐downregulated miR‐100‐5p and miR‐125b‐5p in malignant germ cell tumors causes growth inhibition through cell cycle disruption

open access: yesMolecular Oncology, EarlyView.
MiR‐99a‐5p/miR‐100‐5p (functionally identical) and miR‐125b‐5p microRNAs are downregulated in malignant germ cell tumors (GCTs). Combination replenishment of these microRNAs using mimics resulted in growth inhibition in representative cell lines, with consequent downregulation of target genes involved in cell cycle (confirmed by flow cytometry) and ...
Marta Ferraresso   +12 more
wiley   +1 more source

Adaptive authentication and key agreement mechanism for future cellular systems [PDF]

open access: yes, 2006
Since the radio medium can be accessed by anyone, authentication of users is a very important element of a mobile network. Nowadays, in GSM/GPRS a challenge response protocol is used to authenticate the user to the mobile network.
Dimitriou, T., Komninos, N.
core  

SKA1 promotes oncogenic properties in oral dysplasia and oral squamous cell carcinoma, and augments resistance to radiotherapy

open access: yesMolecular Oncology, EarlyView.
The mitosis‐related gene SKA1 was among 629 genes consistently dysregulated in OSCC across nine public gene expression datasets. In OSCC cell lines, SKA1 promoted proliferation and migration, enhanced radioresistance, and reduced radiation‐induced senescence.
Alexander Michael Grandits   +7 more
wiley   +1 more source

A New Class of Strongly Asymmetric PKA Algorithms: SAA-5

open access: yesCryptography, 2019
A new class of public key agreement (PKA) algorithms called strongly-asymmetric algorithms (SAA) was introduced in a previous paper by some of the present authors.
Luigi Accardi   +3 more
doaj   +1 more source

NanoCMSer: a consensus molecular subtype stratification tool for fresh‐frozen and paraffin‐embedded colorectal cancer samples

open access: yesMolecular Oncology, EarlyView.
Consensus molecular subtypes (CMS1‐4) have been identified to study colorectal cancer heterogeneity and serve as potential biomarkers. In this study, we developed and evaluated NanoCMSer, a NanoString‐based classifier using 55 genes, optimized for FF and FFPE to facilitate the clinical evaluation of CMS subtyping.
Arezo Torang   +10 more
wiley   +1 more source

IMPLEMENTATION OF BLOM’S KEY PREDISTRIBUTION SCHEME BY USING ELLIPTIC CURVE CRYPTOGRAPHY

open access: yesMalaysian Journal of Computing, 2021
Cryptography, along with its various methods is used to serve the security communication purpose. Cryptography is said to be secure if the encryption key is hard to break by the attacker.
Md Nizam Udin   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy