Results 281 to 290 of about 62,040 (316)
Some of the next articles are maybe not open access.

Decrypting C2 inhibitors

Blood, 2014
In this issue of Blood, Nguyen et al employ high-resolution mapping to precisely define epitopes on the C2 domain of blood coagulation factor VIII (FVIII).1 Their results nicely complement a recent report in Blood describing the structure of a ternary complex of 2 inhibitory antibodies with the C2 domain.2 Together, these studies reveal fascinating ...
Voorberg, Jan, Meems, Henriët
openaire   +3 more sources

Decrypting Tratto

Studio 10. Beiträge der Bernd Alois Zimmermann-Gesamtausgabe, 2023
Tratto
Felix Marzillier, Ole Jana
openaire   +1 more source

Onychocryptosis – decrypting the controversies

International Journal of Dermatology, 2020
AbstractOnychocryptosis, or ingrown toenail, is a frequent, painful condition affecting young individuals. Controversies still exist regarding its etiopathogenesis and treatment options, including conservative and surgical techniques. The choice of treatment method depends on the stage of disease as conservative measures are mostly effective in early ...
Vishal Thakur   +2 more
openaire   +2 more sources

Dimerization decrypts antibiotic activity

Science, 2022
Direct dimerization simplifies the synthesis of himastatin and elucidates its mode of ...
openaire   +2 more sources

Decrypting Justice

This book deploys the theory of encryption of to decrypt justice, setting in opposition Justice, written with the hegemonic capital letters of Western ideas, and justice, in its everyday workings within disparate communal forms and the exercise of multiplicity.
  +4 more sources

802.11 "decrypted"

ACM SIGCOMM Computer Communication Review, 2005
This short paper introduces wireless IEEE 802 standards and activities with a focus on explaining the purpose of the many 802.11 amendments.
openaire   +1 more source

Mathematical optimization of decrypting algorithm for soft input decryption

2009 XXII International Symposium on Information, Communication and Automation Technologies, 2009
In this work, the strategy for correction of bits using Soft Input Decryption is analyzed. Soft Input Decryption is used for correction of cryptographic check values, which are very fragile when they are transmitted over noisy channels: only one wrong bit at input of the decryptor causes about 50% of errors at output of the decryptor.
Natasa Zivic, Esad Kadusic, Mirko Skrbic
openaire   +1 more source

Decryptable Searchable Encryption

2007
As such, public-key encryption with keyword search (a.k.a PEKS or searchable encryption) does not allow the recipient to decrypt keywords i.e. encryption is not invertible. This paper introduces searchable encryption schemes which enable decryption. An additional feature is that the decryption key and the trapdoor derivation key are totally independent,
Thomas Fuhr, Pascal Paillier
openaire   +1 more source

Home - About - Disclaimer - Privacy