Results 81 to 90 of about 5,572,769 (345)

Applying Gaussian quantum discord to quantum key distribution

open access: yes, 2014
In this paper, we theoretically prove that the Gaussian quantum discord state of optical field can be used to complete continuous variable (CV) quantum key distribution (QKD). The calculation shows that secret key can be distilled with a Gaussian quantum
Su, Xiaolong
core   +1 more source

Current trends in single‐cell RNA sequencing applications in diabetes mellitus

open access: yesFEBS Open Bio, EarlyView.
Single‐cell RNA sequencing is a powerful approach to decipher the cellular and molecular landscape at a single‐cell resolution. The rapid development of this technology has led to a wide range of applications, including the detection of cellular and molecular mechanisms and the identification and introduction of novel potential diagnostic and ...
Seyed Sajjad Zadian   +6 more
wiley   +1 more source

The Optimal Defense of Networks of Targets [PDF]

open access: yes
This paper examines a game-theoretic model of attack and defense of multiple networks of targets in which there exist intra-network strategic complementarities among targets.
Brian Roberson, Dan Kovenock
core  

A unified model for Duchenne muscular dystrophy gene involvement in cancer: context‐dependent tumour suppression and oncogenicity

open access: yesFEBS Open Bio, EarlyView.
We propose a context‐dependent model where the Duchenne muscular dystrophy (DMD) gene acts as a tumour suppressor in aggressive tumours and as an oncogene in less aggressive ones. We propose this model as a unified framework to explain the opposing survival associations with DMD expression and to guide experimental exploration of the dual role of DMD ...
Lee Machado   +4 more
wiley   +1 more source

A highly optimized flow-correlation attack

open access: yes, 2013
Deciding that two network flows are essentially the same is an important problem in intrusion detection and in tracing anonymous connections. A stepping stone or an anonymity network may try to prevent flow correlation by adding chaff traffic, splitting the flow in several subflows or adding random delays. A well-known attack for these types of systems
Elices, Juan A.   +1 more
openaire   +2 more sources

Flow Correlation Attacks on Tor Onion Service Sessions with Sliding Subset Sum

open access: yesNetwork and Distributed System Security Symposium
—Tor is one of the most popular anonymity networks in use today. Its ability to defend against flow correlation attacks is essential for providing strong anonymity guarantees.
Daniela Lopes   +9 more
semanticscholar   +1 more source

Short‐term actions of epigalocatechin‐3‐gallate in the liver: a mechanistic insight into hypoglycemic and potential toxic effects

open access: yesFEBS Open Bio, EarlyView.
Epigallocatechin‐3‐gallate (EGCG) acutely inhibited gluconeogenesis and enhanced glycolysis, glycogenolysis, and fatty acid oxidation in perfused rat livers. Mechanistic assays revealed mitochondrial uncoupling, inhibition of pyruvate carboxylation and glucose‐6‐phosphatase, shift of NADH/NAD+ ratios toward oxidation, and loss of membrane integrity ...
Carla Indianara Bonetti   +8 more
wiley   +1 more source

Rethinking plastic waste: innovations in enzymatic breakdown of oil‐based polyesters and bioplastics

open access: yesFEBS Open Bio, EarlyView.
Plastic pollution remains a critical environmental challenge, and current mechanical and chemical recycling methods are insufficient to achieve a fully circular economy. This review highlights recent breakthroughs in the enzymatic depolymerization of both oil‐derived polyesters and bioplastics, including high‐throughput protein engineering, de novo ...
Elena Rosini   +2 more
wiley   +1 more source

Conditional correlation attack on combiners withmemory

open access: yesElectronics Letters, 1996
A connection between linear codes and the correlation attack conditioned on the output of binary combiners with memory is established. Using a sort of random coding argument, it is shown that an average combiner with memory is potentially vulnerable to such an attack only if the number of outputs is equal to or greater than the number of inputs.
openaire   +2 more sources

Strategic Alert Throttling for Intrusion Detection Systems [PDF]

open access: yes, 2005
Network intrusion detection systems are themselves becoming targets of attackers. Alert flood attacks may be used to conceal malicious activity by hiding it among a deluge of false alerts sent by the attacker.
Aickelin, Uwe, Tedesco, Gianni
core  

Home - About - Disclaimer - Privacy