Results 111 to 120 of about 2,245,906 (352)
An Improved Lattice-Based Ring Signature with Unclaimable Anonymity in the Standard Model [PDF]
Mingxing Hu, Weijiong Zhang, Zhen Liu
openalex +1 more source
Keratin 19 (KRT19) is overexpressed in high‐grade serous ovarian cancer with high levels of Kallikrein‐related peptidases (KLK) 4–7 and is associated with poor survival. In vivo analyses demonstrate that elevated KRT19 increases peritoneal tumour burden.
Sophia Bielesch +13 more
wiley +1 more source
Hippo pathway at the crossroads of stemness and therapeutic resistance in breast cancer
Dysregulation of the Hippo pathway drives nuclear accumulation of YAP/TAZ, activating stemness‐related transcriptional programs that sustain breast cancer stemness and fuel therapeutic resistance across subtypes, underscoring Hippo signaling as a targetable vulnerability. Figure created and edited with BioRender.com.
Giulia Schiavoni +11 more
wiley +1 more source
Efficient proxy ring signature for VANET
The messages in vehicular ad hoc networks (VANET) are vulnerable to attack in the open wireless environment. Group communication in VANET is receiving more attention, which confronts many security issues.
Lianhai Liu +4 more
doaj +1 more source
CIN85 is highly expressed in osteosarcoma, particularly in metastatic lesions. Its overexpression increases cell migration and Matrigel invasion, while silencing CIN85 suppresses these behaviors. Transcriptome analysis shows that CIN85 regulates MMP2, COL3A1, and Akt/mTOR signaling. Targeting these pathways reverses CIN85‐induced motility, highlighting
Iryna Horak +10 more
wiley +1 more source
Ring adaptor signature scheme based on SM2 digital signature algorithm
Adaptor signature can guarantee the atomicity of cross-chain transactions without relying on trusted third parties, but most adaptor signature algorithms fail to protect the privacy of user identities.
Xu Xinyue +5 more
doaj
In blockchain applications, ring signatures offer significant advantages, particularly in decentralized settings, safeguarding user privacy and data security.
Da Teng, Yanqing Yao, Chao Huang
doaj +1 more source
Intratumour heterogeneity complicates precision management of advanced endometrial cancer. Circulating tumor DNA (ctDNA) offers a minimally invasive strategy to capture tumor evolution and therapeutic resistance. Here, we compare tumor‐agnostic NGS with tumor‐informed ddPCR, outlining their relative sensitivity, concordance, and clinical implications ...
Carlos Casas‐Arozamena +15 more
wiley +1 more source
Property-Based Anonymous Attestation in Trusted Cloud Computing
In the remote attestation on Trusted Computer (TC) computing mode TCCP, the trusted computer TC has an excessive burden, and anonymity and platform configuration information security of computing nodes cannot be guaranteed.
Zhen-Hu Ning +3 more
doaj +1 more source
Ring Signature Scheme Based on Domestic Cryptographic Algorithm SM9 [PDF]
Ring signatures possess spontaneity and anonymity,which can protect user privacy while implementing digital signatures.They have been widely used in scenarios requiring the concealment of the signer’s true identity,such as blockchain,electronic voting ...
XIE Zhenjie, ZHANG Yao, YANG Qichao, SONG Enzhou
doaj +1 more source

