Results 61 to 70 of about 201,296 (311)

A Cross-Trusted Authority Authentication Protocol for Internet of Vehicles Based on Blockchain

open access: yesIEEE Access, 2023
With the increasing number of vehicles connected to the Internet of Vehicles (IoV), to accommodate the evolving needs and patterns of new vehicles, passengers, and drivers, traditional single Trusted Authority (TA) authentication model may no longer be ...
Qi Xie   +3 more
doaj   +1 more source

In vivo evidence for glycyl radical insertion into a catalytically inactive variant of pyruvate formate‐lyase

open access: yesFEBS Letters, EarlyView.
Dimeric pyruvate formate‐lyase cleaves pyruvate using a radical‐based mechanism. G734 serves as a radical storage location, and the radical is transferred to the catalytic C419 residue. Mutation of the C418‐C419 pair causes loss of enzyme activity, but does not impede radical introduction onto G734. Therefore, cis‐ but not trans‐radical transfer occurs
Michelle Kammel   +2 more
wiley   +1 more source

Disruption of SETD3‐mediated histidine‐73 methylation by the BWCFF‐associated β‐actin G74S mutation

open access: yesFEBS Letters, EarlyView.
The β‐actin G74S mutation causes altered interaction of actin with SETD3, reducing histidine‐73 methylation efficiency and forming two distinct actin variants. The variable ratio of these variants across cell types and developmental stages contributes to tissue‐specific phenotypical changes. This imbalance may impair actin dynamics and mechanosensitive
Anja Marquardt   +8 more
wiley   +1 more source

Pseudorandom number generators based on neural networks: a review

open access: yesJournal of King Saud University: Computer and Information Sciences
Pseudorandom number generators are deterministic algorithms capable of producing sequences of numbers that appear sufficiently ”random,” and they find extensive applications across various domains such as cryptography, network security, communications ...
Xuguang Wu   +6 more
doaj   +1 more source

Learning with Errors is easy with quantum samples

open access: yes, 2018
Learning with Errors is one of the fundamental problems in computational learning theory and has in the last years become the cornerstone of post-quantum cryptography.
Grilo, Alex B.   +2 more
core   +2 more sources

Insights into pegRNA design from editing of the cardiomyopathy‐associated phospholamban R14del mutation

open access: yesFEBS Letters, EarlyView.
This study reveals how prime editing guide RNA (pegRNA) secondary structure and reverse transcriptase template length affect prime editing efficiency in correcting the phospholamban R14del cardiomyopathy‐associated mutation. Insights support the design of structurally optimized enhanced pegRNAs for precise gene therapy.
Bing Yao   +7 more
wiley   +1 more source

A Secure Data Sharing Model Utilizing Attribute-Based Signcryption in Blockchain Technology

open access: yesSensors
With the rapid development of the Internet of Things (IoT), the scope of personal data sharing has significantly increased, enhancing convenience in daily life and optimizing resource management.
Chaoyue Song   +3 more
doaj   +1 more source

Counterfactual Quantum Cryptography

open access: yes, 2008
Quantum cryptography allows one to distribute a secret key between two remote parties using the fundamental principles of quantum mechanics. The well-known established paradigm for the quantum key distribution relies on the actual transmission of signal ...
C. H. Bennett   +5 more
core   +1 more source

Message passing variational autoregressive network for solving intractable Ising models

open access: yesCommunications Physics
Deep neural networks have been used to solve Ising models, including autoregressive neural networks, convolutional neural networks, recurrent neural networks, and graph neural networks.
Qunlong Ma   +4 more
doaj   +1 more source

On Cheating Immune Secret Sharing [PDF]

open access: yesDiscrete Mathematics & Theoretical Computer Science, 2004
The paper addresses the cheating prevention in secret sharing. We consider secret sharing with binary shares. The secret also is binary. This model allows us to use results and constructions from the well developed theory of cryptographically strong ...
Josef Pieprzyk, Xian-Mo Zhang
doaj   +1 more source

Home - About - Disclaimer - Privacy