Results 21 to 30 of about 8,710 (316)

Cosic's Resonant Recognition Model for Macromolecules can be used to Predict and Modify the Fluctuating Wavelengths of Ultraweak Photon Emissions from Stressed Cancer Cells [PDF]

open access: yesBiophysical Journal, 2014
During the first 24 hours after removal from incubation cultured B16-BL6 mouse melanoma cells displayed reliable increases in ultraweak photon emission (UPE) of specific wavelengths during discrete time portions of this 24 hour interval. The application of specific filters demonstrated reliable and clear increases in UPE dependent upon the wavelength ...
openaire   +2 more sources

Postwar Serbian Nationalism and the Limits of Invention [PDF]

open access: yes, 2004
Serbs have rarely drawn the attention of theorists of nationalism. Nonetheless, even if they have not been christened this or that sort of nationalist by theorists, they have emerged from the 1990S with two sets of descriptors attached to them by ...
Miller, Nick
core   +2 more sources

Rhythmic Keccak: SCA Security and Low Latency in HW

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2018
Glitches entail a great issue when securing a cryptographic implementation in hardware. Several masking schemes have been proposed in the literature that provide security even in the presence of glitches.
Victor Arribas   +4 more
doaj   +1 more source

STIMONT: A core ontology for multimedia stimuli description [PDF]

open access: yesMultimedia tools and applications, 11042, July 2013, 2014
Affective multimedia documents such as images, sounds or videos elicit emotional responses in exposed human subjects. These stimuli are stored in affective multimedia databases and successfully used for a wide variety of research in psychology and neuroscience in areas related to attention and emotion processing.
arxiv   +1 more source

Multiplicative Masking for AES in Hardware

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2018
Hardware masked AES designs usually rely on Boolean masking and perform the computation of the S-box using the tower-field decomposition. On the other hand, splitting sensitive variables in a multiplicative way is more amenable for the computation of the
Lauren De Meyer   +2 more
doaj   +1 more source

Bioactive peptide design using the Resonant Recognition Model [PDF]

open access: yes, 2007
With a large number of DNA and protein sequences already known, the crucial question is to find out how the biological function of these macromolecules is "written" in the sequence of nucleotides or amino acids.
Cosic, I, Pirogova, E
core   +2 more sources

My other car is your car: compromising the Tesla Model X keyless entry system

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
This paper documents a practical security evaluation of the Tesla Model X keyless entry system. In contrast to other works, the keyless entry system analysed in this paper employs secure symmetric-key and public-key cryptographic primitives implemented ...
Lennert Wouters   +2 more
doaj   +1 more source

Influence of a Concurrent Exercise Training Intervention during Pregnancy on Maternal and Arterial and Venous Cord Serum Cytokines: The GESTAFIT Project [PDF]

open access: yes, 2019
The aim of the present study was to analyze the influence of a supervised concurrent exercise-training program, from the 17th gestational week until delivery, on cytokines in maternal (at 17th and 35th gestational week, and at delivery) and arterial and ...
Acosta-Manzano, Pedro   +10 more
core   +5 more sources

Polychromatic angle resolved IBIC analysis of silicon power diodes [PDF]

open access: yes, 2020
This paper describes both an experimental methodology based on the Ion Beam Induced Charge (IBIC) technique and the relevant interpretative model, which were adopted to characterize the electronic features of power diodes. IBIC spectra were acquired using different proton energies (from 1.2 to 2.0 MeV), angles of incidence, and applied bias voltages ...
arxiv   +1 more source

Design of Symmetric-Key Primitives for Advanced Cryptographic Protocols

open access: yesIACR Transactions on Symmetric Cryptology, 2020
While traditional symmetric algorithms like AES and SHA-3 are optimized for efficient hardware and software implementations, a range of emerging applications using advanced cryptographic protocols such as multi-party computation and zero knowledge proofs
Abdelrahaman Aly   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy