Results 31 to 40 of about 70,954 (220)
A Comparison of Cryptography Courses
The author taught two courses on cryptography, one at Duke University aimed at non-mathematics majors and one at Rose-Hulman Institute of Technology aimed at mathematics and computer science majors.
Holden, Joshua
core +1 more source
Quantum Cryptography for the Future Internet and the Security Analysis
Cyberspace has become the most popular carrier of information exchange in every corner of our life, which is beneficial for our life in almost all aspects.
Tianqi Zhou+4 more
semanticscholar +1 more source
Disruption of SETD3‐mediated histidine‐73 methylation by the BWCFF‐associated β‐actin G74S mutation
The β‐actin G74S mutation causes altered interaction of actin with SETD3, reducing histidine‐73 methylation efficiency and forming two distinct actin variants. The variable ratio of these variants across cell types and developmental stages contributes to tissue‐specific phenotypical changes. This imbalance may impair actin dynamics and mechanosensitive
Anja Marquardt+8 more
wiley +1 more source
Using quantum key distribution for cryptographic purposes: a survey
The appealing feature of quantum key distribution (QKD), from a cryptographic viewpoint, is the ability to prove the information-theoretic security (ITS) of the established keys. As a key establishment primitive, QKD however does not provide a standalone
,+23 more
core +1 more source
Epithelial–mesenchymal transition (EMT) and tumor‐infiltrating lymphocytes (TILs) are associated with early breast cancer response to neoadjuvant chemotherapy (NAC). This study evaluated EMT and TIL shifts, with immunofluorescence and RNA sequencing, at diagnosis and in residual tumors as potential biomarkers associated with treatment response.
Françoise Derouane+16 more
wiley +1 more source
CRYPTOGRAPHIC SOUND SAFETY DATA WITH RC4 ALGORITHM [PDF]
Data security and confidentiality is one of the most important aspects in the field of communication, especially communication using computer media. One area of science used to secure data is cryptography. Cryptography is a science that uses mathematical
A Rahman, Muhdary, Theho, Harryanto
core +1 more source
This review highlights how foundation models enhance predictive healthcare by integrating advanced digital twin modeling with multiomics and biomedical data. This approach supports disease management, risk assessment, and personalized medicine, with the goal of optimizing health outcomes through adaptive, interpretable digital simulations, accessible ...
Sakhaa Alsaedi+2 more
wiley +1 more source
Semi-Trusted Mixer Based Privacy Preserving Distributed Data Mining for Resource Constrained Devices [PDF]
In this paper a homomorphic privacy preserving association rule mining algorithm is proposed which can be deployed in resource constrained devices (RCD).
Kaosar, Md. Golam, Yi, Xun
core +1 more source
Risks and remedies in e-learning system
One of the most effective applications of Information and Communication Technology (ICT) is the emergence of E-Learning. Considering the importance and need of E-Learning, recent years have seen a drastic change of learning methodologies in Higher ...
Barik, Nikhilesh, Karforma, Sunil
core +1 more source
Liver‐specific knockout of N6‐methyladenosine (m6A) methyltransferase METTL3 significantly accelerated hepatic tumor initiation under various oncogenic challenges, contrary to the previously reported oncogenic role of METTL3 in liver cancer cell lines or xenograft models. Mechanistically, METTL3 deficiency reduced m6A deposition on Manf transcripts and
Bo Cui+15 more
wiley +1 more source