Results 81 to 90 of about 1,107,668 (334)

Infrared laser sampling of low volumes combined with shotgun lipidomics reveals lipid markers in palatine tonsil carcinoma

open access: yesMolecular Oncology, EarlyView.
Nanosecond infrared laser (NIRL) low‐volume sampling combined with shotgun lipidomics uncovers distinct lipidome alterations in oropharyngeal squamous cell carcinoma (OPSCC) of the palatine tonsil. Several lipid species consistently differentiate tumor from healthy tissue, highlighting their potential as diagnostic markers.
Leonard Kerkhoff   +11 more
wiley   +1 more source

ID-based on-line/off-line threshold signature scheme without bilinear pairing

open access: yesTongxin xuebao, 2013
Based on the distributed key generation (DKG) protocol and verifiable secret sharing (VSS) protocol,an identity-based on-line/off-line threshold signature scheme was proposed in order to eliminate the cost of the certificate management in the public key ...
Xiao-dong YANG   +3 more
doaj   +2 more sources

A Novel (k,n) Secret Sharing Scheme from Quadratic Residues for Grayscale Images

open access: yes, 2014
A new grayscale image encryption algorithm based on $(k,n)$ threshold secret sharing is proposed. The scheme allows a secret image to be transformed into $n$ shares, where any $k \le n$ shares can be used to reconstruct the secret image, while the ...
Abdelsatir, El-Tigani B.   +3 more
core   +1 more source

Crucial parameters for precise copy number variation detection in formalin‐fixed paraffin‐embedded solid cancer samples

open access: yesMolecular Oncology, EarlyView.
This study shows that copy number variations (CNVs) can be reliably detected in formalin‐fixed paraffin‐embedded (FFPE) solid cancer samples using ultra‐low‐pass whole‐genome sequencing, provided that key (pre)‐analytical parameters are optimized.
Hanne Goris   +10 more
wiley   +1 more source

Dynamic-FROST: Schnorr threshold signatures with a flexible committee

open access: yesJournal of Mathematical Cryptology
Threshold signatures enable any subgroup of predefined cardinality tt out of a committee of nn participants to generate a valid, aggregated signature.
Cimatti Annalisa   +7 more
doaj   +1 more source

Dammarenediol II enhances etoposide‐induced apoptosis by targeting O‐GlcNAc transferase and Akt/GSK3β/mTOR signaling in liver cancer

open access: yesMolecular Oncology, EarlyView.
Etoposide induces DNA damage, activating p53‐dependent apoptosis via caspase‐3/7, which cleaves PARP1. Dammarenediol II enhances this apoptotic pathway by suppressing O‐GlcNAc transferase activity, further decreasing O‐GlcNAcylation. The reduction in O‐GlcNAc levels boosts p53‐driven apoptosis and influences the Akt/GSK3β/mTOR signaling pathway ...
Jaehoon Lee   +8 more
wiley   +1 more source

On QSAR-based cardiotoxicity modeling with the expressiveness-enhanced graph learning model and dual-threshold scheme. [PDF]

open access: yesFront Physiol, 2023
Wang H   +7 more
europepmc   +1 more source

Tumor mutational burden as a determinant of metastatic dissemination patterns

open access: yesMolecular Oncology, EarlyView.
This study performed a comprehensive analysis of genomic data to elucidate whether metastasis in certain organs share genetic characteristics regardless of cancer type. No robust mutational patterns were identified across different metastatic locations and cancer types.
Eduardo Candeal   +4 more
wiley   +1 more source

Resplittable threshold multi-broker proxy re-encryption scheme from lattices

open access: yesTongxin xuebao, 2017
Two different encryption schemes and Lagrange polynomial were used to construct a resplittable threshold multi-broker proxy re-encryption scheme on the lattice,namely the encryption in the ciphertext input and output side was different from the ...
Ju-yan LI, Chun-guang MA, Qian ZHAO
doaj   +2 more sources

Threshold Signature Schemes Application

open access: yesБезопасность информационных технологий, 2015
This work is devoted to an investigation of threshold signature schemes. The systematization of the threshold signature schemes was done, cryptographic constructions based on interpolation Lagrange polynomial, elliptic curves and bilinear pairings were examined. Different methods of generation and verification of threshold signatures were explored, the
Anastasiya Victorovna Beresneva   +1 more
openaire   +1 more source

Home - About - Disclaimer - Privacy