Results 61 to 70 of about 349,531 (370)

On Higher-Order Cryptography [PDF]

open access: yesProceedings of ICALP 2020, 47th International Colloquium on Automata, Languages, and Programming, 2020
International ...
Barak B., Crubille R., Dal Lago U.
openaire   +5 more sources

Taurine promotes glucagon‐like peptide‐1 secretion in enteroendocrine L cells

open access: yesFEBS Letters, EarlyView.
Taurine, a sulfur‐containing amino acid, is likely taken up by enteroendocrine L cells via the taurine transporter. This process increases the levels of cytosolic ATP. The increase in intracellular Ca2+ concentrations and glucagon‐like peptide‐1 secretion through membrane depolarization is caused by the closure of ATP‐sensitive potassium channels ...
Yuri Osuga   +6 more
wiley   +1 more source

The multiple roles of the NlpC_P60 peptidase family in mycobacteria – an underexplored target for antimicrobial drug discovery

open access: yesFEBS Letters, EarlyView.
The NlpC_P60 superfamily of peptidases is recognised by its key role in bacterial cell wall homeostasis. Recently, studies have also described the involvement of NlpC_P60‐like enzymes in bacterial competitive mechanisms and pathogenesis across several lineages.
Catharina dos Santos Silva   +1 more
wiley   +1 more source

SURVEY AND PROPOSED METHOD TO DETECT ADVERSARIAL EXAMPLES USING AN ADVERSARIAL RETRAINING MODEL

open access: yesTạp chí Khoa học Đại học Đà Lạt
Artificial intelligence (AI) has found applications across various sectors and industries, offering numerous advantages to human beings. One prominent area where AI has made significant contributions is in machine learning models.
Thanh Son Phan   +3 more
doaj   +1 more source

A Cross-Trusted Authority Authentication Protocol for Internet of Vehicles Based on Blockchain

open access: yesIEEE Access, 2023
With the increasing number of vehicles connected to the Internet of Vehicles (IoV), to accommodate the evolving needs and patterns of new vehicles, passengers, and drivers, traditional single Trusted Authority (TA) authentication model may no longer be ...
Qi Xie   +3 more
doaj   +1 more source

Probability theory and public-key cryptography [PDF]

open access: yesarXiv, 2020
In this short note, we address a common misconception at the interface of probability theory and public-key cryptography.
arxiv  

Cryptography Vulnerabilities on HackerOne [PDF]

open access: yesarXiv, 2021
Previous studies have shown that cryptography is hard for developers to use and misusing cryptography leads to severe security vulnerabilities. We studied relevant vulnerability reports on the HackerOne bug bounty platform to understand what types of cryptography vulnerabilities exist in the wild.
arxiv  

SoK of Used Cryptography in Blockchain [PDF]

open access: yesIEEE Access, 2019
The underlying fundaments of blockchain are cryptography and cryptographic concepts that provide reliable and secure decentralized solutions. Although many recent papers study the use-cases of blockchain in different industrial areas, such as finance ...
Mayank Raikwar   +2 more
semanticscholar   +1 more source

Making tau amyloid models in vitro: a crucial and underestimated challenge

open access: yesFEBS Letters, EarlyView.
This review highlights the challenges of producing in vitro amyloid assemblies of the tau protein. We review how accurately the existing protocols mimic tau deposits found in the brain of patients affected with tauopathies. We discuss the important properties that should be considered when forming amyloids and the benchmarks that should be used to ...
Julien Broc, Clara Piersson, Yann Fichou
wiley   +1 more source

A new quantum cryptanalysis method on block cipher Camellia

open access: yesIET Information Security, 2021
Symmetric cryptography is expected to be quantum safe when long‐term security is needed. Kuwakado and Morii gave a 3‐round quantum distinguisher of the Feistel cipher based on Simon's algorithm.
Yanjun Li, Hao Lin, Meng Liang, Ying Sun
doaj   +1 more source

Home - About - Disclaimer - Privacy