Results 121 to 130 of about 133,735 (361)

On some block ciphers and imprimitive groups [PDF]

open access: green, 2008
A. Caranti   +2 more
openalex   +1 more source

Multi-keyword Cipher-text Retrieval Method for Smart Grid Edge Computing*

open access: diamond, 2021
Jing Zhu   +4 more
openalex   +1 more source

Crosstalk between the ribosome quality control‐associated E3 ubiquitin ligases LTN1 and RNF10

open access: yesFEBS Letters, EarlyView.
Loss of the E3 ligase LTN1, the ubiquitin‐like modifier UFM1, or the deubiquitinating enzyme UFSP2 disrupts endoplasmic reticulum–ribosome quality control (ER‐RQC), a pathway that removes stalled ribosomes and faulty proteins. This disruption may trigger a compensatory response to ER‐RQC defects, including increased expression of the E3 ligase RNF10 ...
Yuxi Huang   +8 more
wiley   +1 more source

The Methods of Information Security Based on Blurring of System

open access: yesБезопасность информационных технологий, 2016
The paper present the model of researching system with own known input, output and set of discrete internal states. These theoretical objects like an absolutely protected from research system and an absolutely indiscernible data transfer channel are ...
Mikhail Andreevich Styugin
doaj  

Protein pyrophosphorylation by inositol pyrophosphates — detection, function, and regulation

open access: yesFEBS Letters, EarlyView.
Protein pyrophosphorylation is an unusual signaling mechanism that was discovered two decades ago. It can be driven by inositol pyrophosphate messengers and influences various cellular processes. Herein, we summarize the research progress and challenges of this field, covering pathways found to be regulated by this posttranslational modification as ...
Sarah Lampe   +3 more
wiley   +1 more source

About the Soviet Cryptographs Contribution on the Victory by Moscow

open access: yesБезопасность информационных технологий, 2011
On December 5, 2011, we mark the 70th anniversary of the first great defeat on the fascist Germany during the Soviet troops’ counter-offensive of Moscow, which has become the first step towards to the Victory Day.
D. A. Larin
doaj  

Function‐driven design of a surrogate interleukin‐2 receptor ligand

open access: yesFEBS Letters, EarlyView.
Interleukin (IL)‐2 signaling can be achieved and precisely fine‐tuned through the affinity, distance, and orientation of the heterodimeric receptors with their ligands. We designed a biased IL‐2 surrogate ligand that selectively promotes effector T and natural killer cell activation and differentiation. Interleukin (IL) receptors play a pivotal role in
Ziwei Tang   +9 more
wiley   +1 more source

An Extended Hybridization of Vigenere and Caesar Cipher Techniques for Secure Communication

open access: yes, 2016
Cryptography is one of the most popular fields of study these days as it is necessary to maintain the confidentiality of the data which is sent over the network.
Srikanta Patnaik   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy