Results 81 to 90 of about 567,858 (283)

Crucial parameters for precise copy number variation detection in formalin‐fixed paraffin‐embedded solid cancer samples

open access: yesMolecular Oncology, EarlyView.
This study shows that copy number variations (CNVs) can be reliably detected in formalin‐fixed paraffin‐embedded (FFPE) solid cancer samples using ultra‐low‐pass whole‐genome sequencing, provided that key (pre)‐analytical parameters are optimized.
Hanne Goris   +10 more
wiley   +1 more source

Review and Analysis of Cryptographic Schemes Implementing Threshold Signature

open access: yesБезопасность информационных технологий, 2015
This work is devoted to the study of threshold signature schemes. The systematization of the threshold signature schemes was done, cryptographic constructions based on interpolation Lagrange polynomial, ellipt ic curves and bilinear pairings were ...
Anastasiya Victorovna Beresneva   +1 more
doaj  

Adaptively secure, splittable, and robust threshold unsigncryption

open access: yesCybersecurity
As a variant of the signcryption scheme, threshold unsigncryption operates among multiple receiver members through a (t, n) threshold process during the unsigncryption phase to improve security and robustness, and has been widely deployed in various ...
Yuxin Tong   +4 more
doaj   +1 more source

Dammarenediol II enhances etoposide‐induced apoptosis by targeting O‐GlcNAc transferase and Akt/GSK3β/mTOR signaling in liver cancer

open access: yesMolecular Oncology, EarlyView.
Etoposide induces DNA damage, activating p53‐dependent apoptosis via caspase‐3/7, which cleaves PARP1. Dammarenediol II enhances this apoptotic pathway by suppressing O‐GlcNAc transferase activity, further decreasing O‐GlcNAcylation. The reduction in O‐GlcNAc levels boosts p53‐driven apoptosis and influences the Akt/GSK3β/mTOR signaling pathway ...
Jaehoon Lee   +8 more
wiley   +1 more source

Unconditionally-secure ideal robust secret sharing schemes for threshold and multilevel access structure

open access: yesJournal of Mathematical Cryptology, 2013
An n-player -secure robust secret sharing scheme is a (t,n)-threshold secret sharing scheme with the additional property that the secret can be recovered, with probability at least , from the set of all shares even if up to t players provide incorrect ...
Jhanwar Mahabir P.   +1 more
doaj   +1 more source

Threshold and non-linear behavior of lasers of $\Lambda$ and V - configurations

open access: yes, 1998
Dynamic properties of closed three level laser systems are investigated. Two schemes of pumping - $\Lambda$ and V - are considered. It is shown that the non-linear behavior of the photon number as a function of pump both near and far above threshold is ...
A. E. Sigman   +14 more
core   +1 more source

Tumor mutational burden as a determinant of metastatic dissemination patterns

open access: yesMolecular Oncology, EarlyView.
This study performed a comprehensive analysis of genomic data to elucidate whether metastasis in certain organs share genetic characteristics regardless of cancer type. No robust mutational patterns were identified across different metastatic locations and cancer types.
Eduardo Candeal   +4 more
wiley   +1 more source

Adaptation of the modular number system in threshold secret sharing schemes

open access: yesInformatika
Objectives. The purpose of the research is to test the applicability of the adaptation of the modular number system using a masking transformation with a pseudo-random integer value to the original secret S in a modification of Adi Shamir’s (k, n ...
A. F. Chernyavskiy   +3 more
doaj   +1 more source

Exploiting User-Centric Joint Transmission – Coordinated Multipoint With a High Altitude Platform System Architecture

open access: yesIEEE Access, 2019
User-centric joint transmission coordinated multipoint (JT-CoMP) has been shown to enhance the capacity of terrestrial cellular systems, by overcoming cell-edge interference.
Muhammad D. Zakaria   +4 more
doaj   +1 more source

Cyber Security and Key Management Issues for Internet of Things: Techniques, Requirements, and Challenges

open access: yesComplexity, 2020
Internet of Things-based environments pose various challenges due to their anytime/anywhere computing, and the efficient cryptographic based key management is one of the major challenges in Internet of Things.
Mohammad Faisal   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy