Results 71 to 80 of about 212,764 (321)

Adaptive authentication and key agreement mechanism for future cellular systems [PDF]

open access: yes, 2006
Since the radio medium can be accessed by anyone, authentication of users is a very important element of a mobile network. Nowadays, in GSM/GPRS a challenge response protocol is used to authenticate the user to the mobile network.
Dimitriou, T., Komninos, N.
core  

Interplay between circadian and other transcription factors—Implications for cycling transcriptome reprogramming

open access: yesFEBS Letters, EarlyView.
This perspective highlights emerging insights into how the circadian transcription factor CLOCK:BMAL1 regulates chromatin architecture, cooperates with other transcription factors, and coordinates enhancer dynamics. We propose an updated framework for how circadian transcription factors operate within dynamic and multifactorial chromatin landscapes ...
Xinyu Y. Nie, Jerome S. Menet
wiley   +1 more source

A Hierarchical Authorization Reversible Data Hiding in Encrypted Image Based on Secret Sharing

open access: yesMathematics
In the current distributed environment, reversible data hiding in encrypted domain (RDH-ED) cannot grant corresponding privileges according to users’ identity classes.
Chao Jiang   +4 more
doaj   +1 more source

Real‐time assay of ribonucleotide reductase activity with a fluorescent RNA aptamer

open access: yesFEBS Letters, EarlyView.
Ribonucleotide reductases (RNR) synthesize DNA building blocks de novo, making them crucial in DNA replication and drug targeting. FLARE introduces the first single‐tube real‐time coupled RNR assay, which enables isothermal tracking of RNR activity at nanomolar enzyme levels and allows the reconstruction of allosteric regulatory patterns and rapid ...
Jacopo De Capitani   +4 more
wiley   +1 more source

Message passing variational autoregressive network for solving intractable Ising models

open access: yesCommunications Physics
Deep neural networks have been used to solve Ising models, including autoregressive neural networks, convolutional neural networks, recurrent neural networks, and graph neural networks.
Qunlong Ma   +4 more
doaj   +1 more source

On the Frobenius’ Problem of three numbers [PDF]

open access: yesDiscrete Mathematics & Theoretical Computer Science, 2005
Given $k$ natural numbers $\{a_1, \ldots ,a_k\} \subset \mathbb{N}$ with $1 \leq a_1 < a_2 < \ldots < a_k$ and $\mathrm{gcd} (a_1, \ldots ,a_k)=1$, let be $R(a_1, \ldots ,a_k) = \{ \lambda_1 a_1+ \cdots + \lambda_k a_k | \space \lambda_i \in \mathbb{N ...
Francesc Aguiló, Alícia Miralles
doaj   +1 more source

Protein pyrophosphorylation by inositol pyrophosphates — detection, function, and regulation

open access: yesFEBS Letters, EarlyView.
Protein pyrophosphorylation is an unusual signaling mechanism that was discovered two decades ago. It can be driven by inositol pyrophosphate messengers and influences various cellular processes. Herein, we summarize the research progress and challenges of this field, covering pathways found to be regulated by this posttranslational modification as ...
Sarah Lampe   +3 more
wiley   +1 more source

A novel multi-carrier visual cryptography scheme based on XOR and OR operations

open access: yesJournal of King Saud University: Computer and Information Sciences
The conventional Visual Cryptography Scheme (VCS) relying solely on OR operations suffers from poor recovery quality and severe pixel expansion when implemented on physical transparencies.
Yuan Gao   +4 more
doaj   +1 more source

Function‐driven design of a surrogate interleukin‐2 receptor ligand

open access: yesFEBS Letters, EarlyView.
Interleukin (IL)‐2 signaling can be achieved and precisely fine‐tuned through the affinity, distance, and orientation of the heterodimeric receptors with their ligands. We designed a biased IL‐2 surrogate ligand that selectively promotes effector T and natural killer cell activation and differentiation. Interleukin (IL) receptors play a pivotal role in
Ziwei Tang   +9 more
wiley   +1 more source

A bimodal lattice-based linearly homomorphic signature for chain-based implicit data storage scheme

open access: yesDiscover Computing
As the demand for cross-domain collaborative verification grows in fields such as healthcare and industrial Internet of Things, achieving secure and efficient verification of heterogeneous data has become a critical challenge.
Ruifeng Li   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy