Results 71 to 80 of about 69,698 (279)

The (Glg)ABCs of cyanobacteria: modelling of glycogen synthesis and functional divergence of glycogen synthases in Synechocystis sp. PCC 6803

open access: yesFEBS Letters, EarlyView.
We reconstituted Synechocystis glycogen synthesis in vitro from purified enzymes and showed that two GlgA isoenzymes produce glycogen with different architectures: GlgA1 yields denser, highly branched glycogen, whereas GlgA2 synthesizes longer, less‐branched chains.
Kenric Lee   +3 more
wiley   +1 more source

Code based fuzzy extractor for biometric cryptography

open access: yesРадіотехніка, 2018
Methods of forming cryptographic keys of biometric images using fuzzy extractors are considered. A new scheme of a fuzzy extractor based on the McEliece cryptosystem is proposed. It is shown that the new design of the fuzzy extractor allows forming cryptographic passwords from biometric images even without the use of non-secret helper string.
А.А. Kuznetsov   +2 more
openaire   +3 more sources

Structural biology of ferritin nanocages

open access: yesFEBS Letters, EarlyView.
Ferritin is a conserved iron‐storage protein that sequesters iron as a ferric mineral core within a nanocage, protecting cells from oxidative damage and maintaining iron homeostasis. This review discusses ferritin biology, structure, and function, and highlights recent cryo‐EM studies revealing mechanisms of ferritinophagy, cellular iron uptake, and ...
Eloise Mastrangelo, Flavio Di Pisa
wiley   +1 more source

Recent Progress in Code-Based Cryptography [PDF]

open access: yes, 2011
The last three years have witnessed tremendous progress in the understanding of code-based cryptography. One of its most promising applications is the design of cryptographic schemes with exceptionally strong security guarantees and other desirable properties.
Pierre-Louis Cayrel   +4 more
openaire   +1 more source

Tau acetylation at K331 has limited impact on tau pathology in vivo

open access: yesFEBS Letters, EarlyView.
We mapped tau post‐translational modifications in humanized MAPT knock‐in mice and in amyloid‐bearing double knock‐in mice. Acetylation within the repeat domain, particularly around K331, showed modest increases under amyloid pathology. To test functional relevance, we generated MAPTK331Q knock‐in mice.
Shoko Hashimoto   +3 more
wiley   +1 more source

Mathematical models of message authentication in the post-quantum cryptosystems based on error-correcting coding

open access: yesНаука. Инновации. Технологии, 2022
The paper discusses possibilities for use of message authentication signatures schemes based on error-correcting coding which may be candidates for use in post-quantum cryptography.
Aleksandr Aleksandrovich Kuznetsov   +2 more
doaj  

Compact Coding Using Multi-Photon Tolerant Quantum Protocols for Quantum Communication

open access: yes, 2016
This paper presents a new encryption scheme called Compact Coding that encodes information in time, phase, and intensity domains, simultaneously. While these approaches have previously been used one at a time, the proposed scheme brings to bear for the ...
Chan, Kam Wai Clifford   +2 more
core   +2 more sources

Structural insights into an engineered feruloyl esterase with improved MHET degrading properties

open access: yesFEBS Letters, EarlyView.
A feruloyl esterase was engineered to mimic key features of MHETase, enhancing the degradation of PET oligomers. Structural and computational analysis reveal how a point mutation stabilizes the active site and reshapes the binding cleft, expading substrate scope.
Panagiota Karampa   +5 more
wiley   +1 more source

Estimating the cost of generic quantum pre-image attacks on SHA-2 and SHA-3 [PDF]

open access: yes, 2016
We investigate the cost of Grover's quantum search algorithm when used in the context of pre-image attacks on the SHA-2 and SHA-3 families of hash functions.
Amy, Matthew   +5 more
core   +1 more source

An Outline of Security in Wireless Sensor Networks: Threats, Countermeasures and Implementations

open access: yes, 2012
With the expansion of wireless sensor networks (WSNs), the need for securing the data flow through these networks is increasing. These sensor networks allow for easy-to-apply and flexible installations which have enabled them to be used for numerous ...
H.Chen, H.Wang, R.Roman
core   +1 more source

Home - About - Disclaimer - Privacy