Results 51 to 60 of about 42,947 (261)

Single cis‐elements in brassinosteroid‐induced upregulated genes are insufficient to recruit both redox states of the BIL1/BZR1 DNA‐binding domain

open access: yesFEBS Letters, EarlyView.
Phytohormone brassinosteroid‐induced gene regulation by the transcription factor BIL1/BZR1 involves redox‐dependent DNA‐binding alternation and interaction with the transcription factor PIF4. The reduced BIL1/BZR1 dimer binds preferred cis‐elements, while oxidation alters its oligomerization state and disrupts DNA‐binding ability.
Shohei Nosaki   +4 more
wiley   +1 more source

A new quantum cryptanalysis method on block cipher Camellia

open access: yesIET Information Security, 2021
Symmetric cryptography is expected to be quantum safe when long‐term security is needed. Kuwakado and Morii gave a 3‐round quantum distinguisher of the Feistel cipher based on Simon's algorithm.
Yanjun Li, Hao Lin, Meng Liang, Ying Sun
doaj   +1 more source

Structural dynamics of the plant hormone receptor ETR1 in a native‐like membrane environment

open access: yesFEBS Letters, EarlyView.
The present study unveils the structural and signaling dynamics of ETR1, a key plant ethylene receptor. Using an optimized nanodisc system and solution NMR, we captured full‐length ETR1 in a native‐like membrane environment. Our findings reveal dynamic domain uncoupling and Cu(I)‐induced rigidification, providing the first evidence of metal‐triggered ...
Moritz Lemke   +2 more
wiley   +1 more source

On Cheating Immune Secret Sharing [PDF]

open access: yesDiscrete Mathematics & Theoretical Computer Science, 2004
The paper addresses the cheating prevention in secret sharing. We consider secret sharing with binary shares. The secret also is binary. This model allows us to use results and constructions from the well developed theory of cryptographically strong ...
Josef Pieprzyk, Xian-Mo Zhang
doaj   +1 more source

A working model for cytoplasmic assembly of H/ACA snoRNPs

open access: yesFEBS Letters, EarlyView.
Dyskerin is the component of nuclear H/ACA ribonucleoproteins (RNPs) endowed with pseudouridine synthase catalytic activity. Two isoforms of human dyskerin have been characterized: the abundant Iso1, mainly nuclear, and the shorter Iso3, mainly cytoplasmic but occasionally imported into nuclei.
Alberto Angrisani, Maria Furia
wiley   +1 more source

A bimodal lattice-based linearly homomorphic signature for chain-based implicit data storage scheme

open access: yesDiscover Computing
As the demand for cross-domain collaborative verification grows in fields such as healthcare and industrial Internet of Things, achieving secure and efficient verification of heterogeneous data has become a critical challenge.
Ruifeng Li   +4 more
doaj   +1 more source

A Secure Data Sharing Model Utilizing Attribute-Based Signcryption in Blockchain Technology

open access: yesSensors
With the rapid development of the Internet of Things (IoT), the scope of personal data sharing has significantly increased, enhancing convenience in daily life and optimizing resource management.
Chaoyue Song   +3 more
doaj   +1 more source

Mechanistic basis for inhibition of the extended‐spectrum β‐lactamase GES‐1 by enmetazobactam and tazobactam

open access: yesFEBS Letters, EarlyView.
Antimicrobial resistance (AMR) is of huge importance, resulting in over 1 million deaths each year. Here, we describe how a new drug, enmetazobactam, designed to help fight resistant bacterial diseases, inhibits a key enzyme (GES‐1) responsible for AMR. Our data show it is a more potent inhibitor than the related tazobactam, with high‐level computation
Michael Beer   +10 more
wiley   +1 more source

Message passing variational autoregressive network for solving intractable Ising models

open access: yesCommunications Physics
Deep neural networks have been used to solve Ising models, including autoregressive neural networks, convolutional neural networks, recurrent neural networks, and graph neural networks.
Qunlong Ma   +4 more
doaj   +1 more source

A Hierarchical Authorization Reversible Data Hiding in Encrypted Image Based on Secret Sharing

open access: yesMathematics
In the current distributed environment, reversible data hiding in encrypted domain (RDH-ED) cannot grant corresponding privileges according to users’ identity classes.
Chao Jiang   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy