Results 121 to 130 of about 2,245,906 (352)
Efficient Identity Based Ring Signature [PDF]
Identity-based (ID-based) cryptosystems eliminate the need for validity checking of the certificates and the need for registering for a certificate before getting the public key. These two features are desirable especially for the efficiency and the real spontaneity of ring signature, where a user can anonymously sign a message on behalf of a group of ...
Sherman S. M. Chow +2 more
openaire +1 more source
Dormant cancer cells can hide in distant organs for years, evading treatment and the immune system. This review highlights how signals from the surrounding tissue and immune environment keep these cells inactive or trigger their reawakening. Understanding these mechanisms may help develop therapies to eliminate or control dormant cells and prevent ...
Kanishka Tiwary +1 more
wiley +1 more source
Cross-Chain Asset Transaction Method Based on Ring Signature for Identity Privacy Protection [PDF]
Shuhui Zhang +4 more
openalex +1 more source
Radiotherapy (RT) response depends on the DNA repair capacity of tumor and host cells. We show that circulating tumor cell (CTC) counts and apoptosis rates before and after RT predict treatment response and outcome, which can be accessed via easily accessible liquid biopsy approaches. Created in BioRender. Wikman, H.
Yvonne Goy +10 more
wiley +1 more source
Overview of molecular signatures of senescence and associated resources: pros and cons
Cells can enter a stress response state termed cellular senescence that is involved in various diseases and aging. Detecting these cells is challenging due to the lack of universal biomarkers. This review presents the current state of senescence identification, from biomarkers to molecular signatures, compares tools and approaches, and highlights ...
Orestis A. Ntintas +6 more
wiley +1 more source
Identity-based Linkable Ring Signcryption on NTRU Lattice [PDF]
Although the current lattice-based ring signcryption scheme resists quantum attacks,it has large key storage and high encryption/decryption time.The linkable lattice ring signcryption scheme not only can protect signer anonymity,but also can determine ...
TANG Jiayi, HUANG Xiaofang, WANG Licheng, ODOOM J
doaj +1 more source
DIVRS: Data integrity verification based on ring signature in cloud storage
Miao Tian +4 more
openalex +2 more sources
Targeting TNBC: core–shell polycationic polyurea dendrimers with inherent anticancer activity
Core–shell polycationic PURE dendrimers were tested in TNBC‐derived tumor models. Both formulations selectively targeted TNBC and effectively reduced tumor volume. PUREG4‐OEI48 suppressed tumor growth without detectable toxicity, whereas PUREG4‐OCEI24, despite showing efficacy, induced hepatic toxicity.
Adriana Cruz +9 more
wiley +1 more source
From the work by Laguillaumie and Vergnaud in ICICS’04, it has been widely believed that multi-designated verifiers signature scheme (MDVS) can be constructed from ring signature schemes in general.
Yamashita Kyosuke, Hara Keisuke
doaj +1 more source
Raman‐based label‐free microscopic analysis of the pancreas in living zebrafish larvae
Forward stimulated Raman scattering (F‐SRS) and epi coherent anti‐Stokes Raman scattering (E‐CARS) allow label‐free discrimination of distinct subcellular structures in the pancreas of living zebrafish larvae. Given the straightforward applicability, we anticipate broad implementation of Raman microscopy in other organs and across various biomedical ...
Noura Faraj +3 more
wiley +1 more source

