Results 31 to 40 of about 2,693,059 (249)

Analysis of the Security of BB84 by Model Checking [PDF]

open access: yes, 2010
Quantum Cryptography or Quantum key distribution (QKD) is a technique that allows the secure distribution of a bit string, used as key in cryptographic protocols.
Azizi, Abdelmalek   +2 more
core   +2 more sources

The power of microRNA regulation—insights into immunity and metabolism

open access: yesFEBS Letters, EarlyView.
MicroRNAs are emerging as crucial regulators at the intersection of metabolism and immunity. This review examines how miRNAs coordinate glucose and lipid metabolism while simultaneously modulating T‐cell development and immune responses. Moreover, it highlights how cutting‐edge artificial intelligence applications can identify miRNA biomarkers ...
Stefania Oliveto   +2 more
wiley   +1 more source

Ubic: Bridging the gap between digital cryptography and the physical world

open access: yes, 2014
Advances in computing technology increasingly blur the boundary between the digital domain and the physical world. Although the research community has developed a large number of cryptographic primitives and has demonstrated their usability in all ...
D.M. Freeman   +6 more
core   +1 more source

The Saccharomyces cerevisiae amino acid transporter Lyp1 has a broad substrate spectrum

open access: yesFEBS Letters, EarlyView.
In Saccharomyces cerevisiae, Yeast Amino acid Transporter family members mediate the import of amino acids, ranging from substrate specialists to generalists. Here, we show that the specialist transporter, Lyp1, has a broader substrate spectrum than previously described, with affinity constants spanning from micromolar to millimolar.
Foteini Karapanagioti   +3 more
wiley   +1 more source

Modeling Network Security: Case Study of Email System [PDF]

open access: yesInternational Journal of Advanced Computer Science and Applications (IJACSA), Volume 11, Issue 3, March 2020, 2020
We study operational security in computer network security, including infrastructure, internal processes, resources, information, and physical environment. Current works on developing a security framework focus on a security ontology that contributes to applying common vocabulary, but such an approach does not assist in constructing a foundation for a ...
arxiv  

Evaluation of the use of web technology by government of Sri Lanka to ensure food security for its citizens [PDF]

open access: yesProcedia Food Science,Volume 6, 2016, Pages 82_91, International Conference of Sabaragamuwa University of Sri Lanka 2015 (ICSUSL 2015), 2016
Web technology is one of the key areas in information and communication technology to be used as a powerful tool in ensuring food security which is one of the main issues in Sri Lanka. Web technology involves in communicating and sharing resources in network of computers all over the world.
arxiv   +1 more source

Quantum Cryptography for the Future Internet and the Security Analysis

open access: yesSecur. Commun. Networks, 2018
Cyberspace has become the most popular carrier of information exchange in every corner of our life, which is beneficial for our life in almost all aspects.
Tianqi Zhou   +4 more
semanticscholar   +1 more source

Response to neoadjuvant chemotherapy in early breast cancers is associated with epithelial–mesenchymal transition and tumor‐infiltrating lymphocytes

open access: yesMolecular Oncology, EarlyView.
Epithelial–mesenchymal transition (EMT) and tumor‐infiltrating lymphocytes (TILs) are associated with early breast cancer response to neoadjuvant chemotherapy (NAC). This study evaluated EMT and TIL shifts, with immunofluorescence and RNA sequencing, at diagnosis and in residual tumors as potential biomarkers associated with treatment response.
Françoise Derouane   +16 more
wiley   +1 more source

CRYPTOGRAPHIC SOUND SAFETY DATA WITH RC4 ALGORITHM [PDF]

open access: yes, 2019
Data security and confidentiality is one of the most important aspects in the field of communication, especially communication using computer media. One area of science used to secure data is cryptography. Cryptography is a science that uses mathematical
A Rahman, Muhdary, Theho, Harryanto
core   +1 more source

Improved RSA security using Chinese Remainder Theorem and Multiple Keys [PDF]

open access: yes, 2020
Now a days, have a great dependence on computer and network and the security of computer related to the whole world and everybody. Cryptography is the art and science of achieving security by encoding message to make them non readable, to secure data ...
Abdulkader, Hatem   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy