Results 61 to 70 of about 201,296 (311)
A Cross-Trusted Authority Authentication Protocol for Internet of Vehicles Based on Blockchain
With the increasing number of vehicles connected to the Internet of Vehicles (IoV), to accommodate the evolving needs and patterns of new vehicles, passengers, and drivers, traditional single Trusted Authority (TA) authentication model may no longer be ...
Qi Xie+3 more
doaj +1 more source
Dimeric pyruvate formate‐lyase cleaves pyruvate using a radical‐based mechanism. G734 serves as a radical storage location, and the radical is transferred to the catalytic C419 residue. Mutation of the C418‐C419 pair causes loss of enzyme activity, but does not impede radical introduction onto G734. Therefore, cis‐ but not trans‐radical transfer occurs
Michelle Kammel+2 more
wiley +1 more source
Disruption of SETD3‐mediated histidine‐73 methylation by the BWCFF‐associated β‐actin G74S mutation
The β‐actin G74S mutation causes altered interaction of actin with SETD3, reducing histidine‐73 methylation efficiency and forming two distinct actin variants. The variable ratio of these variants across cell types and developmental stages contributes to tissue‐specific phenotypical changes. This imbalance may impair actin dynamics and mechanosensitive
Anja Marquardt+8 more
wiley +1 more source
Pseudorandom number generators based on neural networks: a review
Pseudorandom number generators are deterministic algorithms capable of producing sequences of numbers that appear sufficiently ”random,” and they find extensive applications across various domains such as cryptography, network security, communications ...
Xuguang Wu+6 more
doaj +1 more source
Learning with Errors is easy with quantum samples
Learning with Errors is one of the fundamental problems in computational learning theory and has in the last years become the cornerstone of post-quantum cryptography.
Grilo, Alex B.+2 more
core +2 more sources
This study reveals how prime editing guide RNA (pegRNA) secondary structure and reverse transcriptase template length affect prime editing efficiency in correcting the phospholamban R14del cardiomyopathy‐associated mutation. Insights support the design of structurally optimized enhanced pegRNAs for precise gene therapy.
Bing Yao+7 more
wiley +1 more source
A Secure Data Sharing Model Utilizing Attribute-Based Signcryption in Blockchain Technology
With the rapid development of the Internet of Things (IoT), the scope of personal data sharing has significantly increased, enhancing convenience in daily life and optimizing resource management.
Chaoyue Song+3 more
doaj +1 more source
Counterfactual Quantum Cryptography
Quantum cryptography allows one to distribute a secret key between two remote parties using the fundamental principles of quantum mechanics. The well-known established paradigm for the quantum key distribution relies on the actual transmission of signal ...
C. H. Bennett+5 more
core +1 more source
Message passing variational autoregressive network for solving intractable Ising models
Deep neural networks have been used to solve Ising models, including autoregressive neural networks, convolutional neural networks, recurrent neural networks, and graph neural networks.
Qunlong Ma+4 more
doaj +1 more source
On Cheating Immune Secret Sharing [PDF]
The paper addresses the cheating prevention in secret sharing. We consider secret sharing with binary shares. The secret also is binary. This model allows us to use results and constructions from the well developed theory of cryptographically strong ...
Josef Pieprzyk, Xian-Mo Zhang
doaj +1 more source