The Signature Program: Bringing the Protocol to the Patient
نویسندگان
چکیده
Early-phase clinical development in oncology has evolved dramatically with the deciphering of the human genome in 2004. Genomic analysis and the tools identifying genetically disrupted pathways within a patient's tumor have been a driving force for personalized medicine and for the development of highly targeted novel therapies. Tumors are often genetically heterogeneous, with multiple concurrent genetic abnormalities. On the other hand, tumors arising from different tissues may share identical molecular drivers.
منابع مشابه
The new protocol blind digital signature based on the discrete logarithm problem on elliptic curve
In recent years it has been trying that with regard to the question of computational complexity of discrete logarithm more strength and less in the elliptic curve than other hard issues, applications such as elliptic curve cryptography, a blind digital signature method, other methods such as encryption replacement DLP. In this paper, a new blind digital signature scheme based on elliptic curve...
متن کاملDouble voter perceptible blind signature based electronic voting protocol
Mu et al. have proposed an electronic voting protocol and claimed that it protects anonymity of voters, detects double voting and authenticates eligible voters. It has been shown that it does not protect voter's privacy and prevent double voting. After that, several schemes have been presented to fulfill these properties. However, many of them suffer from the same weaknesses. In this p...
متن کاملAn ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure
Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication. This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...
متن کاملConvertible limited (multi-) verifier signature: new constructions and applications
A convertible limited (multi-) verifier signature (CL(M)VS) provides controlled verifiability and preserves the privacy of the signer. Furthermore, limited verifier(s) can designate the signature to a third party or convert it into a publicly verifiable signature upon necessity. In this proposal, we first present a generic construction of convertible limited verifier signature (CLVS) into which...
متن کاملEarly Rehabilitation Protocol for Bullae Repair and Pleurectomy: A Case Report
Background: Postoperative physiotherapy is routinely prescribed for patients after thoracic surgeries. There are no established guidelines for exercise prescription after pleural resection surgeries. The present study aimed to determine the effect of an individualized postoperative physiotherapy program on a patient who underwent pleurectomy. Methods: A 19-year-old female patient was admitted ...
متن کاملComparing the Efficacy of Training of Problem Solving Program on Depression, Anxiety and Stress in Family Members of Pulmonary Patients and Hospital Personnel
Background: Encountering a patient in the family environment and at work place may play an important role in the incidence of psychological problems among family members and health personnel. Considering the lack of enough literature in this field, we aimed to investigate the degree of improvement in anxiety, stress, depression and problem solving styles by training them with the problem solvin...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره 98 شماره
صفحات -
تاریخ انتشار 2015