Results 111 to 120 of about 2,245,906 (352)

Keratin 19 as a prognostic marker and contributing factor of metastasis and chemoresistance in high‐grade serous ovarian cancer

open access: yesMolecular Oncology, EarlyView.
Keratin 19 (KRT19) is overexpressed in high‐grade serous ovarian cancer with high levels of Kallikrein‐related peptidases (KLK) 4–7 and is associated with poor survival. In vivo analyses demonstrate that elevated KRT19 increases peritoneal tumour burden.
Sophia Bielesch   +13 more
wiley   +1 more source

Hippo pathway at the crossroads of stemness and therapeutic resistance in breast cancer

open access: yesMolecular Oncology, EarlyView.
Dysregulation of the Hippo pathway drives nuclear accumulation of YAP/TAZ, activating stemness‐related transcriptional programs that sustain breast cancer stemness and fuel therapeutic resistance across subtypes, underscoring Hippo signaling as a targetable vulnerability. Figure created and edited with BioRender.com.
Giulia Schiavoni   +11 more
wiley   +1 more source

Efficient proxy ring signature for VANET

open access: yesThe Journal of Engineering, 2019
The messages in vehicular ad hoc networks (VANET) are vulnerable to attack in the open wireless environment. Group communication in VANET is receiving more attention, which confronts many security issues.
Lianhai Liu   +4 more
doaj   +1 more source

Adaptor protein CIN85 potentiates the motility of osteosarcoma cells via the Akt/mTOR and MMP2‐COL3A1 axis

open access: yesMolecular Oncology, EarlyView.
CIN85 is highly expressed in osteosarcoma, particularly in metastatic lesions. Its overexpression increases cell migration and Matrigel invasion, while silencing CIN85 suppresses these behaviors. Transcriptome analysis shows that CIN85 regulates MMP2, COL3A1, and Akt/mTOR signaling. Targeting these pathways reverses CIN85‐induced motility, highlighting
Iryna Horak   +10 more
wiley   +1 more source

Ring adaptor signature scheme based on SM2 digital signature algorithm

open access: yes网络与信息安全学报
Adaptor signature can guarantee the atomicity of cross-chain transactions without relying on trusted third parties, but most adaptor signature algorithms fail to protect the privacy of user identities.
Xu Xinyue   +5 more
doaj  

Optimizing signature space performance in privacy-enhanced blockchains: novel ring signature solutions

open access: yesEURASIP Journal on Information Security
In blockchain applications, ring signatures offer significant advantages, particularly in decentralized settings, safeguarding user privacy and data security.
Da Teng, Yanqing Yao, Chao Huang
doaj   +1 more source

Longitudinal circulating tumor DNA profiling in patients with advanced endometrial cancer using an off‐the‐shelf targeted NGS panel

open access: yesMolecular Oncology, EarlyView.
Intratumour heterogeneity complicates precision management of advanced endometrial cancer. Circulating tumor DNA (ctDNA) offers a minimally invasive strategy to capture tumor evolution and therapeutic resistance. Here, we compare tumor‐agnostic NGS with tumor‐informed ddPCR, outlining their relative sensitivity, concordance, and clinical implications ...
Carlos Casas‐Arozamena   +15 more
wiley   +1 more source

Property-Based Anonymous Attestation in Trusted Cloud Computing

open access: yesJournal of Electrical and Computer Engineering, 2014
In the remote attestation on Trusted Computer (TC) computing mode TCCP, the trusted computer TC has an excessive burden, and anonymity and platform configuration information security of computing nodes cannot be guaranteed.
Zhen-Hu Ning   +3 more
doaj   +1 more source

Ring Signature Scheme Based on Domestic Cryptographic Algorithm SM9 [PDF]

open access: yesJisuanji kexue
Ring signatures possess spontaneity and anonymity,which can protect user privacy while implementing digital signatures.They have been widely used in scenarios requiring the concealment of the signer’s true identity,such as blockchain,electronic voting ...
XIE Zhenjie, ZHANG Yao, YANG Qichao, SONG Enzhou
doaj   +1 more source

Home - About - Disclaimer - Privacy