Results 51 to 60 of about 124,822 (278)

Anonymity-Preserving Public-Key Encryption: A Constructive Approach [PDF]

open access: yes, 2013
. A receiver-anonymous channel allows a sender to send a message to a receiver without an adversary learning for whom the message is intended. Wireless broadcast channels naturally provide receiver anonymity, as does multi-casting one message to a ...
A. Beimel   +18 more
core   +3 more sources

Colorectal cancer‐derived FGF19 is a metabolically active serum biomarker that exerts enteroendocrine effects on mouse liver

open access: yesMolecular Oncology, EarlyView.
Meta‐transcriptome analysis identified FGF19 as a peptide enteroendocrine hormone associated with colorectal cancer prognosis. In vivo xenograft models showed release of FGF19 into the blood at levels that correlated with tumor volumes. Tumoral‐FGF19 altered murine liver metabolism through FGFR4, thereby reducing bile acid synthesis and increasing ...
Jordan M. Beardsley   +5 more
wiley   +1 more source

Searchable Public Key Encryption Supporting Semantic Multi-Keywords Search

open access: yesIEEE Access, 2019
Searchable public key encryption (SPE) that supports multi-keywords search, allows data users to retrieve encrypted files of interest efficiently, and thus it has been intensively studied during recent years. However, most existing SPE solutions focus on
Yu Zhang, Yifan Wang, Yin Li
doaj   +1 more source

Strong knowledge extractors for public-key encryption schemes [PDF]

open access: yes, 2010
Completely non-malleable encryption schemes resist attacks which allow an adversary to tamper with both ciphertexts and public keys. In this paper we introduce two extractor-based properties that allow us to gain insight into the design of such schemes ...
Barbosa, Manuel, Farshim, Pooya
core   +1 more source

Network divergence analysis identifies adaptive gene modules and two orthogonal vulnerability axes in pancreatic cancer

open access: yesMolecular Oncology, EarlyView.
Tumors contain diverse cellular states whose behavior is shaped by context‐dependent gene coordination. By comparing gene–gene relationships across biological contexts, we identify adaptive transcriptional modules that reorganize into distinct vulnerability axes.
Brian Nelson   +9 more
wiley   +1 more source

Efficient All-or-Nothing Public Key Encryption With Authenticated Equality Test

open access: yesIEEE Access, 2021
Public key encryption with equality test (PKEET for short) is a new cryptographic primitive which allows a proxy to check whether two ciphertexts encrypted under different public keys are of the same plaintext.
Zhi-Yan Zhao, Peng Zeng
doaj   +1 more source

Establishment of a humanized patient‐derived xenograft mouse model of high‐grade serous ovarian cancer for preclinical evaluation of combination immunotherapy

open access: yesMolecular Oncology, EarlyView.
We have established a humanized orthotopic patient‐derived xenograft (Hu‐oPDX) mouse model of high‐grade serous ovarian cancer (HGSOC) that recapitulates human tumor–immune interactions. Using combined anti‐PD‐L1/anti‐CD73 immunotherapy, we demonstrate the model's improved biological relevance and enhanced translational value for preclinical ...
Luka Tandaric   +10 more
wiley   +1 more source

Multiple-Image Encryption Mechanism Based on Ghost Imaging and Public Key Cryptography

open access: yesIEEE Photonics Journal, 2019
On the basis of ghost imaging, this paper proposes a multiple-image encryption scheme combining public key cryptography and Hadamard basis pattern. In the encryption system, a plurality of light paths are set, and the Hadamard basis patterns are used for
Leihong Zhang   +3 more
doaj   +1 more source

Pairing-Free for Public Key Encryption With Equality Test Scheme

open access: yesIEEE Access, 2021
The modular exponentiation has been proved better in terms of computational efficiency as compared to bilinear pairing. Therefore, discrete logarithm, a concept of modular exponentiation may be incorporated to present improved security schemes. With this
Huijun Zhu   +3 more
doaj   +1 more source

Combining Public Key Encryption with Keyword Search and Public Key Encryption

open access: yesIEICE Transactions on Information and Systems, 2009
In this paper, we study the problem of secure integrating public key encryption with keyword search (PEKS) with public key data encryption (PKE). We argue the previous security model is not complete regarding keyword privacy and the previous constructions are secure only in the random oracle model.
Rui ZHANG, Hideki IMAI
openaire   +2 more sources

Home - About - Disclaimer - Privacy