Results 71 to 80 of about 564,681 (292)

Elliptic threshold secret division scheme

open access: yesVestnik Samarskogo Gosudarstvennogo Tehničeskogo Universiteta. Seriâ: Fiziko-Matematičeskie Nauki, 2009
Summary: The new aspect of proactive systems realization was developed based on elliptic curves arithmetic. Neural network model of secret division scheme at elliptic curve is introduced. Prolongation mechanism of the scheme was developed. Neural network model of secret regeneration is introduced.
openaire   +2 more sources

Exploiting metabolic adaptations to overcome dabrafenib treatment resistance in melanoma cells

open access: yesMolecular Oncology, EarlyView.
We show that dabrafenib‐resistant melanoma cells undergo mitochondrial remodeling, leading to elevated respiration and ROS production balanced by stronger antioxidant defenses. This altered redox state promotes survival despite mitochondrial damage but renders resistant cells highly vulnerable to ROS‐inducing compounds such as PEITC, highlighting redox
Silvia Eller   +17 more
wiley   +1 more source

A Verifiable Multi-Secret Sharing Scheme for Hierarchical Access Structure

open access: yesAxioms
Sharing confidential information is a critical concern in today’s world. Secret sharing schemes facilitate the sharing of secrets in a way that ensures only authorized participants (shareholders) can access the secret using their allocated shares ...
Irfan Alam   +3 more
doaj   +1 more source

$\order(\Gamma)$ Corrections to $W$ pair production in $e^+e^-$ and $\gamma\gamma$ collisions

open access: yes, 1993
Several schemes to introduce finite width effects to reactions involving unstable elementary particles are given and the differences between them are investigated.
Aeppli   +14 more
core   +1 more source

Threshold Encryption Scheme based on Cocks' IBE Scheme

open access: yesThe KIPS Transactions:PartC, 2012
Since one of weak points of public crypto-systems is to require the verification of public key, identity based crypto-systems were proposed as an alternative. However, such techniques need a private key generator which can be a single point of failure. To improve such weakness, threshold identity-based crypto-systems were proposed.
Sergey V. Bezzateev, Dae-Youb Kim
openaire   +2 more sources

LINC01116, a hypoxia‐lncRNA marker of pathological lymphangiogenesis and poor prognosis in lung adenocarcinoma

open access: yesMolecular Oncology, EarlyView.
The LINC01116 long noncoding RNA is induced by hypoxia and associated with poor prognosis and high recurrence rates in two cohorts of lung adenocarcinoma patients. Here, we demonstrate that besides its expression in cancer cells, LINC01116 is markedly expressed in lymphatic endothelial cells of the tumor stroma in which it participates in hypoxia ...
Marine Gautier‐Isola   +12 more
wiley   +1 more source

Molecular Communications: Model-Based and Data-Driven Receiver Design and Optimization

open access: yesIEEE Access, 2019
In this paper, we consider a molecular communication system that is made of a 3D unbounded diffusion channel model without flow, a point transmitter, and a spherical absorbing receiver.
Xuewen Qian   +2 more
doaj   +1 more source

Strong-Coupling Constant at Three Loops in Momentum Subtraction Scheme

open access: yes, 2008
In this paper we compute the three-loop corrections to the $\beta$ function in a momentum subtraction (MOM) scheme with a massive quark. The calculation is performed in the background field formalism applying asymptotic expansions for small and large ...
't Hooft   +31 more
core   +1 more source

ATF4‐mediated stress response as a therapeutic vulnerability in chordoma

open access: yesMolecular Oncology, EarlyView.
We screened 5 chordoma cell lines against 100+ inhibitors of epigenetic and metabolic pathways and kinases and identified halofuginone, a tRNA synthetase inhibitor. Mechanistically halofuginone induces an integrated stress response, with eIF2alpha phosphorylation, activation of ATF4 and its target genes CHOP, ASNS, INHBE leading to cell death ...
Lucia Cottone   +11 more
wiley   +1 more source

PATS: Let Parties Have a Say in Threshold Group Key Sharing

open access: yesIET Information Security
We present a password-authenticated (2, 3)-threshold group key share (PATS) mechanism. Although PATS resembles threshold secret sharing schemes, it has a different structure.
Adnan Kılıç   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy