Results 41 to 50 of about 124,822 (278)

Plecstatin inhibits hepatocellular carcinoma tumorigenesis and invasion through cytolinker plectin

open access: yesMolecular Oncology, EarlyView.
The ruthenium‐based metallodrug plecstatin exerts its anticancer effect in hepatocellular carcinoma (HCC) primarily through selective targeting of plectin. By disrupting plectin‐mediated cytoskeletal organization, plecstatin inhibits anchorage‐dependent growth, cell polarization, and tumor cell dissemination.
Zuzana Outla   +10 more
wiley   +1 more source

Recurrent cancer‐associated ERBB4 mutations are transforming and confer resistance to targeted therapies

open access: yesMolecular Oncology, EarlyView.
We show that the majority of the 18 analyzed recurrent cancer‐associated ERBB4 mutations are transforming. The most potent mutations are activating, co‐operate with other ERBB receptors, and are sensitive to pan‐ERBB inhibitors. Activating ERBB4 mutations also promote therapy resistance in EGFR‐mutant lung cancer.
Veera K. Ojala   +15 more
wiley   +1 more source

Partially coherent optical chip enables physical-layer public-key encryption

open access: yesOpto-Electronic Advances
Public-key encryption is essential for secure communications, eliminating the need for pre-shared keys. However, traditional schemes such as RSA (Rivest-Shamir-Adleman) and elliptic curve cryptography rely on computational complexity, making them ...
Bo Wu   +5 more
doaj   +1 more source

Peroxidasin enables melanoma immune escape by inhibiting natural killer cell cytotoxicity

open access: yesMolecular Oncology, EarlyView.
Peroxidasin (PXDN) is secreted by melanoma cells and binds the NK cell receptor NKG2D, thereby suppressing NK cell activation and cytotoxicity. PXDN depletion restores NKG2D signaling and enables effective NK cell–mediated melanoma killing. These findings identify PXDN as a previously unrecognized immune evasion factor and a potential target to improve
Hsu‐Min Sung   +17 more
wiley   +1 more source

Public-Key Encryption With Keyword Search via Obfuscation

open access: yesIEEE Access, 2019
Public-key encryption with keyword search (PEKS) enables users to search on encrypted data, which is applicable to the scenario of sharing data in the cloud storage. In this paper, we focus on how to construct a PEKS scheme via obfuscation.
Chengyu Hu   +3 more
doaj   +1 more source

Cybersecurity-Enhanced Encrypted Control System Using Keyed-Homomorphic Public Key Encryption

open access: yesIEEE Access, 2023
Encrypted control systems are secure control methods that use the cryptographic properties of a specific homomorphic encryption scheme. This study proposes a cyberattack-detectable encrypted control system and validates its effectiveness using a ...
Masaki Miyamoto   +3 more
doaj   +1 more source

Secure and {\sl Practical} Identity-Based Encryption [PDF]

open access: yes, 2005
In this paper, we present a variant of Waters' Identity-Based Encryption scheme with a much smaller public-key size (only a few kilobytes). We show that this variant is semantically secure against passive adversaries in the standard model.\smallskip In
Naccache, David
core   +1 more source

Security Against Related Randomness Attacks via Reconstructive Extractors [PDF]

open access: yes, 2015
. This paper revisits related randomness attacks against public key encryption schemes as introduced by Paterson, Schuldt and Sibborn (PKC 2014). We present a general transform achieving security for pub-lic key encryption in the related randomness ...
Paterson, Kenneth   +3 more
core   +2 more sources

Correlation of the differential expression of PIK3R1 and its spliced variant, p55α, in pan‐cancer

open access: yesMolecular Oncology, EarlyView.
PIK3R1 undergoes alternative splicing to generate the isoforms, p85α and p55α. By combining large patient datasets with laboratory experiments, we show that PIK3R1 spliced variants shape cancer behavior. While tumors lose the protective p85α isoform, p55α is overexpressed, changes linked to poorer survival and more pronounced in African American ...
Ishita Gupta   +10 more
wiley   +1 more source

A Public Key Compression Scheme for Fully Homomorphic Encryption Based on Quadratic Parameters With Correction

open access: yesIEEE Access, 2017
For efficiency improvement and public key size reduction, a new public key compression scheme is proposed for fully homomorphic encryption based on quadratic parameters with correction (QPC-PKC scheme).
Liquan Chen, Ming Lim, Zijuan Fan
doaj   +1 more source

Home - About - Disclaimer - Privacy