Results 71 to 80 of about 201,296 (311)
Tomographic Quantum Cryptography
We present a protocol for quantum cryptography in which the data obtained for mismatched bases are used in full for the purpose of quantum state tomography.
A. Beige+28 more
core +1 more source
In the adult T‐cell leukemia/lymphoma (ATL) cell line ED, the human T‐cell leukemia virus type 1 (HTLV‐1) provirus was integrated into the intron of the ift81 gene in the antisense orientation. Despite this integration, both the intact ift81 and the viral oncogene hbz were simultaneously expressed, likely due to the functional insufficiency of viral ...
Mayuko Yagi+5 more
wiley +1 more source
Rewriting the dendritic cell code in cancer—from subset identity to immunotherapeutic design
Dendritic cells (DCs) play central roles in cancer immunity but are often subverted by the tumor microenvironment. This review explores the diversity of DC subsets, their functional plasticity, and emerging therapeutic strategies to reprogram DCs for enhanced antitumor responses, including vaccines, in vivo targeting, and DC‐based immunotherapies ...
Estevão Carlos Silva Barcelos+3 more
wiley +1 more source
EEFDA: enabling efficient and fault-tolerant data aggregation scheme without TA in smart grid
Smart grid can be effectively enhanced by user data, however, data breaches pose significant risks related to privacy violations and data misuse. To address this issue, fault-tolerant privacy-preserving data aggregation schemes can protect data privacy ...
Yuanyuan Wang+4 more
doaj +1 more source
On the Frobenius’ Problem of three numbers [PDF]
Given $k$ natural numbers $\{a_1, \ldots ,a_k\} \subset \mathbb{N}$ with $1 \leq a_1 < a_2 < \ldots < a_k$ and $\mathrm{gcd} (a_1, \ldots ,a_k)=1$, let be $R(a_1, \ldots ,a_k) = \{ \lambda_1 a_1+ \cdots + \lambda_k a_k | \space \lambda_i \in \mathbb{N ...
Francesc Aguiló, Alícia Miralles
doaj +1 more source
A Comparison of Cryptography Courses
The author taught two courses on cryptography, one at Duke University aimed at non-mathematics majors and one at Rose-Hulman Institute of Technology aimed at mathematics and computer science majors.
Holden, Joshua
core +1 more source
Cryptography - Lecture 3: Modern cryptography
Cryptography - Lecture 3: Modern cryptography This lecture is devoted to general description of basic ideas of the modern cryptography - block ciphers (DES, AES) and public key cryptography (secret transmission, electronic signature, key exchange and secret sharing schemes)
openaire +2 more sources
From omics to AI—mapping the pathogenic pathways in type 2 diabetes
Integrating multi‐omics data with AI‐based modelling (unsupervised and supervised machine learning) identify optimal patient clusters, informing AI‐driven accurate risk stratification. Digital twins simulate individual trajectories in real time, guiding precision medicine by matching patients to targeted therapies.
Siobhán O'Sullivan+2 more
wiley +1 more source
Key distribution in PKC through Quantas
Cryptography literally means "The art & science of secret writing & sending a message between two parties in such a way that its contents cannot be understood by someone other than the intended recipient". and Quantum word is related with "Light".
Goel, Aditya
core +1 more source
Tuberculosis remains a global health challenge and new therapeutic targets are required. Here, we characterized SseA, a sulfurtransferase from Mycobacterium tuberculosis involved in macrophage infection, and its interaction with the newly identified protein SufEMtb that activates SseA enzymatic activity.
Giulia Di Napoli+10 more
wiley +1 more source