Results 111 to 120 of about 211,629 (261)
α‐Synuclein fibrils exhibit distinct mechanical properties influencing their neurotoxicity and pathogenicity in synucleinopathies like Parkinson's disease. Combining optical tweezers and molecular dynamics simulations, this study builds the structure–mechanics relationships of wild‐type and two disease‐associated mutants E46K and A53T α‐Synuclein ...
Lulu Bi+9 more
wiley +1 more source
Cryptanalysis of the Hash Function LUX-256 [PDF]
LUX is a new hash function submitted to NIST\u27s SHA-3 competition. In this paper, we found some non-random properties of LUX due to the weakness of origin shift vector.
Dengguo Feng, Shuang Wu, Wenling Wu
core
An experimental flow regime map to dynamically structure gas–solid bubbling fluidized beds
Abstract Employing oscillatory gas flows to create ordered bubble dynamics in fluidized beds represents a promising approach in reactor design, enhancing efficiency, scalability, and control. This study reports an extensive experimental campaign that identifies the operational regime for structuring Geldart B fluidized beds, introducing a novel pattern
Kaiqiao Wu+3 more
wiley +1 more source
Trust-Based Distributed Authentication Method for Collision Attack Avoidance in VANETs
A vehicular ad hoc network (VANET) is a collection of mobile vehicles that aids roadside communication through vehicle-to-vehicle and vehicle-to-infrastructure operation modes.
A.M.R. Tolba
doaj +1 more source
On the security of the Blockchain Bix Protocol and Certificates
The BIX protocol is a blockchain-based protocol that allows distribution of certificates linking a subject with his public key, hence providing a service similar to that of a PKI but without the need of a CA.
Longo, Riccardo+3 more
core +1 more source
This article answers the question “Where is the best place to apply compliance in a multirotor micro aerial vehicle to make it more collision‐resilient?” by analyzing the output data of more than 1200 drone collision tests for four main configurations of micro‐quadcopters each possessing a unique softness layout of physical frame.
Amirali Abazari+3 more
wiley +1 more source
Security of signed ELGamal encryption [PDF]
Assuming a cryptographically strong cyclic group G of prime order q and a random hash function H, we show that ElGamal encryption with an added Schnorr signature is secure against the adaptive chosen ciphertext attack, in which an attacker can freely use
Jakobsson, Markus, Schnorr, Claus Peter
core
D‐HAT: A Diatom‐Inspired Structure for a Helmet Concept Against Trauma
This study introduces a helmet liner concept inspired by diatom exoskeletons. Using finite element analysis, 3D printing, and testing, the authors demonstrate its energy absorption capabilities, providing impact resistance comparable to current materials while offering greater multifunctionality.
Ludovico Musenich+3 more
wiley +1 more source
Au(I)‐, Au(II)‐, Au(III)‐Fluoride Complexes: Synthesis and Applications in Organic Transformations
In this review, the synthesis and reactivity of organometallic gold‐fluoride complexes in oxidation states of Au(I), Au(II), and Au(III) are summarised. A widespread interest in C−C and C−F coupling reactions has resulted in several developments of these complexes with a range of supporting ligands, which has enabled their reactivity to be studied ...
Alexi T. Sedikides+3 more
wiley +2 more sources
Simple Electromagnetic Analysis in Cryptography
The article describes the main principle and methods of simple electromagnetic analysis and thus provides an overview of simple electromagnetic analysis.The introductions chapters describe specific SPA attack used visual inspection of EM traces, template
Zdenek Martinasek+2 more
doaj +1 more source