Results 61 to 70 of about 349,531 (370)
On Higher-Order Cryptography [PDF]
International ...
Barak B., Crubille R., Dal Lago U.
openaire +5 more sources
Taurine promotes glucagon‐like peptide‐1 secretion in enteroendocrine L cells
Taurine, a sulfur‐containing amino acid, is likely taken up by enteroendocrine L cells via the taurine transporter. This process increases the levels of cytosolic ATP. The increase in intracellular Ca2+ concentrations and glucagon‐like peptide‐1 secretion through membrane depolarization is caused by the closure of ATP‐sensitive potassium channels ...
Yuri Osuga+6 more
wiley +1 more source
The NlpC_P60 superfamily of peptidases is recognised by its key role in bacterial cell wall homeostasis. Recently, studies have also described the involvement of NlpC_P60‐like enzymes in bacterial competitive mechanisms and pathogenesis across several lineages.
Catharina dos Santos Silva+1 more
wiley +1 more source
SURVEY AND PROPOSED METHOD TO DETECT ADVERSARIAL EXAMPLES USING AN ADVERSARIAL RETRAINING MODEL
Artificial intelligence (AI) has found applications across various sectors and industries, offering numerous advantages to human beings. One prominent area where AI has made significant contributions is in machine learning models.
Thanh Son Phan+3 more
doaj +1 more source
A Cross-Trusted Authority Authentication Protocol for Internet of Vehicles Based on Blockchain
With the increasing number of vehicles connected to the Internet of Vehicles (IoV), to accommodate the evolving needs and patterns of new vehicles, passengers, and drivers, traditional single Trusted Authority (TA) authentication model may no longer be ...
Qi Xie+3 more
doaj +1 more source
Probability theory and public-key cryptography [PDF]
In this short note, we address a common misconception at the interface of probability theory and public-key cryptography.
arxiv
Cryptography Vulnerabilities on HackerOne [PDF]
Previous studies have shown that cryptography is hard for developers to use and misusing cryptography leads to severe security vulnerabilities. We studied relevant vulnerability reports on the HackerOne bug bounty platform to understand what types of cryptography vulnerabilities exist in the wild.
arxiv
SoK of Used Cryptography in Blockchain [PDF]
The underlying fundaments of blockchain are cryptography and cryptographic concepts that provide reliable and secure decentralized solutions. Although many recent papers study the use-cases of blockchain in different industrial areas, such as finance ...
Mayank Raikwar+2 more
semanticscholar +1 more source
Making tau amyloid models in vitro: a crucial and underestimated challenge
This review highlights the challenges of producing in vitro amyloid assemblies of the tau protein. We review how accurately the existing protocols mimic tau deposits found in the brain of patients affected with tauopathies. We discuss the important properties that should be considered when forming amyloids and the benchmarks that should be used to ...
Julien Broc, Clara Piersson, Yann Fichou
wiley +1 more source
A new quantum cryptanalysis method on block cipher Camellia
Symmetric cryptography is expected to be quantum safe when long‐term security is needed. Kuwakado and Morii gave a 3‐round quantum distinguisher of the Feistel cipher based on Simon's algorithm.
Yanjun Li, Hao Lin, Meng Liang, Ying Sun
doaj +1 more source