Results 71 to 80 of about 564,681 (292)
Elliptic threshold secret division scheme
Summary: The new aspect of proactive systems realization was developed based on elliptic curves arithmetic. Neural network model of secret division scheme at elliptic curve is introduced. Prolongation mechanism of the scheme was developed. Neural network model of secret regeneration is introduced.
openaire +2 more sources
Exploiting metabolic adaptations to overcome dabrafenib treatment resistance in melanoma cells
We show that dabrafenib‐resistant melanoma cells undergo mitochondrial remodeling, leading to elevated respiration and ROS production balanced by stronger antioxidant defenses. This altered redox state promotes survival despite mitochondrial damage but renders resistant cells highly vulnerable to ROS‐inducing compounds such as PEITC, highlighting redox
Silvia Eller +17 more
wiley +1 more source
A Verifiable Multi-Secret Sharing Scheme for Hierarchical Access Structure
Sharing confidential information is a critical concern in today’s world. Secret sharing schemes facilitate the sharing of secrets in a way that ensures only authorized participants (shareholders) can access the secret using their allocated shares ...
Irfan Alam +3 more
doaj +1 more source
$\order(\Gamma)$ Corrections to $W$ pair production in $e^+e^-$ and $\gamma\gamma$ collisions
Several schemes to introduce finite width effects to reactions involving unstable elementary particles are given and the differences between them are investigated.
Aeppli +14 more
core +1 more source
Threshold Encryption Scheme based on Cocks' IBE Scheme
Since one of weak points of public crypto-systems is to require the verification of public key, identity based crypto-systems were proposed as an alternative. However, such techniques need a private key generator which can be a single point of failure. To improve such weakness, threshold identity-based crypto-systems were proposed.
Sergey V. Bezzateev, Dae-Youb Kim
openaire +2 more sources
The LINC01116 long noncoding RNA is induced by hypoxia and associated with poor prognosis and high recurrence rates in two cohorts of lung adenocarcinoma patients. Here, we demonstrate that besides its expression in cancer cells, LINC01116 is markedly expressed in lymphatic endothelial cells of the tumor stroma in which it participates in hypoxia ...
Marine Gautier‐Isola +12 more
wiley +1 more source
Molecular Communications: Model-Based and Data-Driven Receiver Design and Optimization
In this paper, we consider a molecular communication system that is made of a 3D unbounded diffusion channel model without flow, a point transmitter, and a spherical absorbing receiver.
Xuewen Qian +2 more
doaj +1 more source
Strong-Coupling Constant at Three Loops in Momentum Subtraction Scheme
In this paper we compute the three-loop corrections to the $\beta$ function in a momentum subtraction (MOM) scheme with a massive quark. The calculation is performed in the background field formalism applying asymptotic expansions for small and large ...
't Hooft +31 more
core +1 more source
ATF4‐mediated stress response as a therapeutic vulnerability in chordoma
We screened 5 chordoma cell lines against 100+ inhibitors of epigenetic and metabolic pathways and kinases and identified halofuginone, a tRNA synthetase inhibitor. Mechanistically halofuginone induces an integrated stress response, with eIF2alpha phosphorylation, activation of ATF4 and its target genes CHOP, ASNS, INHBE leading to cell death ...
Lucia Cottone +11 more
wiley +1 more source
PATS: Let Parties Have a Say in Threshold Group Key Sharing
We present a password-authenticated (2, 3)-threshold group key share (PATS) mechanism. Although PATS resembles threshold secret sharing schemes, it has a different structure.
Adnan Kılıç +2 more
doaj +1 more source

