Results 41 to 50 of about 5,572,769 (345)

Cryptanalysis of Reduced round SKINNY Block Cipher

open access: yesIACR Transactions on Symmetric Cryptology, 2018
SKINNY is a family of lightweight tweakable block ciphers designed to have the smallest hardware footprint. In this paper, we present zero-correlation linear approximations and the related-tweakey impossible differential characteristics for different ...
Sadegh Sadeghi   +2 more
doaj   +1 more source

Multidimensional Zero-Correlation Linear Cryptanalysis of the Block Cipher KASUMI [PDF]

open access: yes, 2014
The block cipher KASUMI is widely used for security in many synchronous wireless standards. It was proposed by ETSI SAGE for usage in 3GPP (3rd Generation Partnership Project) ciphering algorthms in 2001.
Chen, Shaozhen, Yi, Wentan
core  

The cytoskeletal control of B cell receptor and integrin signaling in normal B cells and chronic lymphocytic leukemia

open access: yesFEBS Letters, EarlyView.
In lymphoid organs, antigen recognition and B cell receptor signaling rely on integrins and the cytoskeleton. Integrins act as mechanoreceptors, couple B cell receptor activation to cytoskeletal remodeling, and support immune synapse formation as well as antigen extraction.
Abhishek Pethe, Tanja Nicole Hartmann
wiley   +1 more source

Zero correlation-integral attack of MIBS block cipher

open access: yesTongxin xuebao, 2016
MIBS is a lightweight block cipher for extremely constrained environments such as RFID tags and sensor networks. The MIBS algorithm's ability to resist zero correlation-integral analysis was evaluated. An 8-round zero corre-lation linear distinguisher of
Qing-cong LIU   +3 more
doaj   +2 more sources

Vulnerability association evaluation of Internet of thing devices based on attack graph

open access: yesInternational Journal of Distributed Sensor Networks, 2022
Device vulnerabilities emerge one after another in the Internet of thing environment, the attackers attack vulnerabilities on several low-level devices simultaneously by multi-step attack method to trigger the vulnerabilities on other high-level devices ...
Yao Ma   +4 more
doaj   +1 more source

B cell mechanobiology in health and disease: emerging techniques and insights into therapeutic responses

open access: yesFEBS Letters, EarlyView.
B cells sense external mechanical forces and convert them into biochemical signals through mechanotransduction. Understanding how malignant B cells respond to physical stimuli represents a groundbreaking area of research. This review examines the key mechano‐related molecules and pathways in B lymphocytes, highlights the most relevant techniques to ...
Marta Sampietro   +2 more
wiley   +1 more source

MF‐RF: A detection approach based on multi‐features and random forest algorithm for improved collusive interest flooding attack

open access: yesIET Information Security, 2023
A new type of Collusive Interest Flooding Attack (CIFA), Improved Collusive Interest Flooding Attack (I‐CIFA), which originates from CIFA with a stronger concealment, higher attack effect, lower attack cost, and wider attack range in Named Data ...
Meng Yue, Silin Peng, Wenzhi Feng
doaj   +1 more source

Node Survival in Networks under Correlated Attacks

open access: yesPLOS ONE, 2015
We study the interplay between correlations, dynamics, and networks for repeated attacks on a socio-economic network. As a model system we consider an insurance scheme against disasters that randomly hit nodes, where a node in need receives support from its network neighbors.
Dieter Armbruster   +2 more
openaire   +6 more sources

Circulating histones as clinical biomarkers in critically ill conditions

open access: yesFEBS Letters, EarlyView.
Circulating histones are emerging as promising biomarkers in critical illness due to their diagnostic, prognostic, and therapeutic potential. Detection methods such as ELISA and mass spectrometry provide reliable approaches for quantifying histone levels in plasma samples.
José Luis García‐Gimenez   +17 more
wiley   +1 more source

Host security assessment method based on attack graph

open access: yesTongxin xuebao, 2022
In order to solve the problems of inaccurate calculation of host security value and ignoring host correlation in attack graph, a host security assessment method based on attack graph was proposed.First, the host attack graph was generated to quantify the
Hongyu YANG, Haihang YUAN, Liang ZHANG
doaj   +2 more sources

Home - About - Disclaimer - Privacy