Results 71 to 80 of about 40,010 (281)

On-demand key management based on social attribute for opportunistic networks

open access: yesTongxin xuebao, 2012
An on-demand key management scheme was proposed based on social attributes,which could conform to the characteristics of intermittent connectivity,high mobility and self-organized management in opportunistic networks.By utilizing the identity-based ...
Xi CHEN   +3 more
doaj   +2 more sources

Attribute-based alterable threshold ring signature scheme with conspiracy attack immunity

open access: yesTongxin xuebao, 2015
Attribute-based cryptography is a generalization and development of the identity-based cryptography,which extends the identity to a set of attributes.In the attribute-based cryptosystem,different members with the same attributes can form a signature ring
Zhen CHEN, Wen-fang ZHANG, Xiao-min WANG
doaj   +2 more sources

CD47 promotes mitogen‐activated protein kinase and epithelial‐to‐mesenchymal transition molecular programs to drive prometastatic phenotypes in non‐small cell lung cancer

open access: yesMolecular Oncology, EarlyView.
Beyond its role in immune evasion, this study identified that CD47 drives tumor‐intrinsic signaling in non‐small cell lung cancer (NSCLC). Transcriptomic profiling and functional studies revealed that CD47 regulates cell adhesion, migration, and metastasis through an ERK–EMT signaling axis.
Asa P.Y. Lau   +8 more
wiley   +1 more source

Encryption of Covert Information into Multiple Statistical Distributions

open access: yes, 2006
A novel strategy to encrypt covert information (code) via unitary projections into the null spaces of ill-conditioned eigenstructures of multiple host statistical distributions, inferred from incomplete constraints, is presented.
Bennett   +15 more
core   +1 more source

NKCC1: A key regulator of glioblastoma progression

open access: yesMolecular Oncology, EarlyView.
Glioblastoma (GBM) progression is driven by disrupted chloride cotransporter homeostasis. NKCC1 is highly expressed in stem‐like, astrocytic, and progenitor cells, correlating with earlier recurrence, while overall survival remains unaffected. NKCC1 serves as a prognostic marker and potential therapeutic target, linking chloride transporter imbalance ...
Anja Thomsen   +5 more
wiley   +1 more source

Authenticated tree parity machine key exchange

open access: yes, 2004
The synchronisation of Tree Parity Machines (TPMs), has proven to provide a valuable alternative concept for secure symmetric key exchange. Yet, from a cryptographer's point of view, authentication is at least as important as a secure exchange of keys ...
Schaumburg, André, Volkmer, Markus
core  

Transcriptional profiling of circulating extracellular vesicles from prebiopsy prostate cancer patients

open access: yesMolecular Oncology, EarlyView.
RNA profiling of circulating extracellular vesicles (EVs) from blood samples of men undergoing prostate biopsy identifies transcripts associated with clinically significant prostate cancer. Integrative analysis with public tumor datasets links EV‐derived gene signatures to tumor stage and progression‐free survival, highlighting CASP3, XRCC2, and RIT1 ...
Stefan Werner   +14 more
wiley   +1 more source

Efficiency identity-based threshold group signature scheme

open access: yesTongxin xuebao, 2009
Threshold group signature was used to guarantee the security of the collective decision.To improve the efficiency,a new identity-based cryptography threshold group signature scheme was proposed basing on bilinear pairing and secret sharing.In this scheme,
LIU Hong-wei 1   +3 more
doaj   +2 more sources

Adaptively Secure Threshold Cryptography: Introducing Concurrency, Removing Erasures [PDF]

open access: yes, 2000
We put forward two new measures of security for threshold schemes secure in the adaptive adversary model: security under concurrent composition; and security without the assumption of reliable erasure. Using novel constructions and analytical tools, in both these settings, we exhibit efficient secure threshold protocols for a variety of cryptographic ...
Stanisław Jarecki, Anna Lysyanskaya
openaire   +1 more source

Adaptor protein CIN85 potentiates the motility of osteosarcoma cells via the Akt/mTOR and MMP2‐COL3A1 axis

open access: yesMolecular Oncology, EarlyView.
CIN85 is highly expressed in osteosarcoma, particularly in metastatic lesions. Its overexpression increases cell migration and Matrigel invasion, while silencing CIN85 suppresses these behaviors. Transcriptome analysis shows that CIN85 regulates MMP2, COL3A1, and Akt/mTOR signaling. Targeting these pathways reverses CIN85‐induced motility, highlighting
Iryna Horak   +10 more
wiley   +1 more source

Home - About - Disclaimer - Privacy