Results 101 to 110 of about 87,772 (336)

Security amplification by composition: The case of doubly-iterated, ideal ciphers [PDF]

open access: bronze, 1998
William Aiello   +3 more
openalex   +3 more sources

Inhibitor Petri Net that Executes an Arbitrary Given Markov Normal Algorithm

open access: yesМоделирование и анализ информационных систем, 2011
The inhibitor Petri net with a fixed structure that executes an arbitrary given Markov normal algorithm was constructed. The algorithm and its input string are encoded by nonnegative integer numbers and put into dedicated places of the Petri net which ...
D. A. Zaitsev
doaj  

Use of cipher and cipher-key in carbohydrate nomenclature

open access: yes, 2009
Department of Chemistry, Jadavpur University, Kolkata-700 032, India E-mail : ghoshrina@yahoo.com Manuscript received 27 January 2009, revised 19 May 2009, accepted 19 May 2009 The steric structures of the carbohydrates and related compounds have been concised and generalised through a proposed cipher and cipher-key to make the study easier.
Amalendu Banerjee   +2 more
openaire   +2 more sources

C9orf72 ALS‐causing mutations lead to mislocalization and aggregation of nucleoporin Nup107 into stress granules

open access: yesFEBS Letters, EarlyView.
Mutations in the C9orf72 gene represent the most common genetic cause of amyotrophic lateral sclerosis (ALS), a fatal neurodegenerative disease. Using patient‐derived neurons and C. elegans models, we find that the nucleoporin Nup107 is dysregulated in C9orf72‐associated ALS. Conversely, reducing Nup107 levels mitigates disease‐related changes.
Saygın Bilican   +7 more
wiley   +1 more source

Comparative Study between Stream Cipher and Block Cipher using RC4 and Hill Cipher

open access: yesInternational Journal of Computer Applications, 2010
Sometimes the information, which is transferred during the communication, is very much confidential which is needed to be secure. For securing the information various encryption algorithms like DES, BLOWFISH, RC4 etc., are used. Our aim in this paper is to find the two keys using cryptanalysis method, that is used for encrypting the information ...
Shish Ahmad   +4 more
openaire   +2 more sources

From lactation to malignancy: A comparison between healthy and cancerous breast gland at single‐cell resolution reveals new issues for tumorigenesis

open access: yesFEBS Letters, EarlyView.
Single‐cell RNA sequencing reveals an opposite role of SLPI in basal tumors based on metastatic spread, along with shared activation of specific regulons in cancer cells and mature luminal lactocytes, as well as downregulation of MALAT1 and NEAT1 in the latter.
Pietro Ancona   +4 more
wiley   +1 more source

The dynamics of the CBC Mode of Operation

open access: yes, 2016
In cryptography, the Cipher Block Chaining (CBC), one of the most commonly used mode in recent years, is a mode of operation that uses a block cipher to provide confidentiality or authenticity.
Abidi, Abdessalem   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy