Results 51 to 60 of about 47,059 (344)

Secure Algorithms for SAKA Protocol in the GSM Network [PDF]

open access: yes, 2017
This paper deals with the security vulnerabilities of the cryptographic algorithms A3, A8, and A5 existing in the GSM network. We review these algorithms and propose new secure algorithms named NewA3, NewA8, and NewA5 algorithms with respect to the A3 ...
Chaudhari, N.S., Saxena, N.
core   +1 more source

PudgyTurtle Mode Resists Bit-Flipping Attacks

open access: yesCryptography, 2023
Cryptosystems employing a synchronous binary-additive stream cipher are susceptible to a generic attack called ’bit-flipping’, in which the ciphertext is modified to decrypt into a fraudulent message.
David A. August, Anne C. Smith
doaj   +1 more source

Unraveling the metastasis‐preventing effect of miR‐200c in vitro and in vivo

open access: yesMolecular Oncology, EarlyView.
Advanced tumors and ineffective cancer treatments can lead to metastases in distant organs. The sole expression of microRNA 200c (miR‐200c) in breast cancer cells is shown to significantly reduce metastasis formation in xenograft mouse models. Various in vitro analyses revealed impeded migratory behavior, upon miR‐200c expression, as one prerequisite ...
Bianca Köhler   +12 more
wiley   +1 more source

The PTTG1/VASP axis promotes oral squamous cell carcinoma metastasis by modulating focal adhesion and actin filaments

open access: yesMolecular Oncology, EarlyView.
VASP was found to be overexpressed in metastatic oral squamous cell carcinoma (OSCC) tissues. Notably, PTTG1‐ and VASP‐deficient OSCC cells demonstrated suppressed metastatic properties by disrupting the interaction between the cytoskeleton and focal adhesion (FAs) in the filopodia region.
Suyeon Park   +6 more
wiley   +1 more source

Targeted metabolomics reveals novel diagnostic biomarkers for colorectal cancer

open access: yesMolecular Oncology, EarlyView.
This study employed targeted metabolomic profiling to identify 302 distinct metabolites present in platelet‐rich plasma (PRP), revealing aberrant metabolic profiles amongst individuals diagnosed with colorectal cancer (CRC). Compared to carcinoembryonic antigen (CEA) and cancer antigen 19‐9 (CA199), our metabolite panel showed improved sensitivity ...
Zuojian Hu   +7 more
wiley   +1 more source

A New Guess-and-Determine Attack on the A5/1 Stream Cipher [PDF]

open access: yes, 2012
In Europe and North America, the most widely used stream cipher to ensure privacy and confidentiality of conversations in GSM mobile phones is the A5/1. In this paper, we present a new attack on the A5/1 stream cipher with an average time complexity of 2^
Mahalanobis, Ayan, Shah, Jay
core   +1 more source

Beyond digital twins: the role of foundation models in enhancing the interpretability of multiomics modalities in precision medicine

open access: yesFEBS Open Bio, EarlyView.
This review highlights how foundation models enhance predictive healthcare by integrating advanced digital twin modeling with multiomics and biomedical data. This approach supports disease management, risk assessment, and personalized medicine, with the goal of optimizing health outcomes through adaptive, interpretable digital simulations, accessible ...
Sakhaa Alsaedi   +2 more
wiley   +1 more source

SUATU ALGORITMA KRIPTOGRAFI STREAM CIPHER BERDASARKAN FUNGSI CHAOS [PDF]

open access: yes, 2012
Salah satu sifat fungsi chaos adalah sensitif terhadap nilai awal, artinya perubahan kecil pada nilai awal akan mengakibatkan perubahan besar pada nilai fungsi selanjutnya.
Dwi, Lestari, Muhamad Zaki, Riyanto
core  

A New Random Keys Generator Depend on Multi Techniques [PDF]

open access: yesEngineering and Technology Journal, 2015
A stream cipher is a symmetric cipher which operates with a time-varying transformation onIndividual plaintext digits. By contrast, block ciphers operate with a fixed transformation on large blocks of plaintext digits.
Alaa kadhim, Hussein Abed
doaj   +1 more source

Intracellular protein crystallization in living insect cells

open access: yesFEBS Open Bio, EarlyView.
This research protocol provides a step‐by‐step guide for applying the InCellCryst pipeline for intracellular protein crystallization. After gene cloning and generation of recombinant baculoviruses, High Five insect cells are infected for target protein crystallization.
Robert Schönherr   +8 more
wiley   +1 more source

Home - About - Disclaimer - Privacy