Results 81 to 90 of about 334,436 (368)

The anabolic steroid stanozolol is a potent inhibitor of human MutT homolog 1

open access: yesFEBS Letters, EarlyView.
MutT homolog 1 (MTH1) is a member of the NUDIX superfamily of enzymes and is an anticancer drug target. We show that stanozolol (Stz), an anabolic steroid, is an unexpected nanomolar inhibitor of MTH1. The X‐ray crystal structure of the human MTH1–Stz complex reveals a unique binding scaffold that could be utilized for future inhibitor development ...
Emma Scaletti Hutchinson   +7 more
wiley   +1 more source

Message passing variational autoregressive network for solving intractable Ising models

open access: yesCommunications Physics
Deep neural networks have been used to solve Ising models, including autoregressive neural networks, convolutional neural networks, recurrent neural networks, and graph neural networks.
Qunlong Ma   +4 more
doaj   +1 more source

A Hierarchical Authorization Reversible Data Hiding in Encrypted Image Based on Secret Sharing

open access: yesMathematics
In the current distributed environment, reversible data hiding in encrypted domain (RDH-ED) cannot grant corresponding privileges according to users’ identity classes.
Chao Jiang   +4 more
doaj   +1 more source

Adaptive authentication and key agreement mechanism for future cellular systems [PDF]

open access: yes, 2006
Since the radio medium can be accessed by anyone, authentication of users is a very important element of a mobile network. Nowadays, in GSM/GPRS a challenge response protocol is used to authenticate the user to the mobile network.
Dimitriou, T., Komninos, N.
core  

Exploring lipid diversity and minimalism to define membrane requirements for synthetic cells

open access: yesFEBS Letters, EarlyView.
Designing the lipid membrane of synthetic cells is a complex task, in which its various roles (among them solute transport, membrane protein support, and self‐replication) should all be integrated. In this review, we report the latest top‐down and bottom‐up advances and discuss compatibility and complexity issues of current engineering approaches ...
Sergiy Gan   +2 more
wiley   +1 more source

Neural cryptography

open access: yesProceedings of the 9th International Conference on Neural Information Processing, 2002. ICONIP '02., 2004
9th International Conference on Neural Information Processing, Singapore, Nov ...
Kinzel, Wolfgang, Kanter, Ido
openaire   +2 more sources

The multidrug and toxin extrusion (MATE) transporter DTX51 antagonizes non‐cell‐autonomous HLS1–AMP1 signaling in a region‐specific manner

open access: yesFEBS Letters, EarlyView.
The Arabidopsis mutants hls1 hlh1 and amp1 lamp1 exhibit pleiotropic developmental phenotypes. Although the functions of the causative genes remain unclear, they act in the same genetic pathway and are thought to generate non‐cell‐autonomous signals.
Takashi Nobusawa, Makoto Kusaba
wiley   +1 more source

Cryptography - Lecture 3: Modern cryptography

open access: yes, 2022
Cryptography - Lecture 3: Modern cryptography This lecture is devoted to general description of basic ideas of the modern cryptography - block ciphers (DES, AES) and public key cryptography (secret transmission, electronic signature, key exchange and secret sharing schemes)
openaire   +2 more sources

A Pseudo DNA Cryptography Method

open access: yes, 2009
The DNA cryptography is a new and very promising direction in cryptography research. DNA can be used in cryptography for storing and transmitting the information, as well as for computation.
Celland   +20 more
core   +1 more source

Practical device-independent quantum cryptography via entropy accumulation

open access: yesNature Communications, 2018
Device-independent cryptography goes beyond conventional quantum cryptography by providing security that holds independently of the quality of the underlying physical devices.
Rotem Arnon-Friedman   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy