Results 51 to 60 of about 3,545,158 (344)

Certificate Authority Capacity and Digital Signature Market Demand in Promoting Interoperability in Malaysia [PDF]

open access: yesITM Web of Conferences
The adoption of digital signatures is becoming increasingly popular among Malaysian users due to its many advantages, including increased security, convenience, and cost savings.
Azni A.H.   +5 more
doaj   +1 more source

HARDWARE SUPPORT PROCEDURES FOR ASYMMETRIC AUTHENTICATION OF THE INTERNET OF THINGS

open access: yesСучасний стан наукових досліджень та технологій в промисловості, 2021
Subject of research: procedures of asymmetric authentication of Internet of Things nodes to ensure the highest level of security using cryptographic chips.
Петро Сергійович Клімушин   +5 more
doaj   +1 more source

The Caenorhabditis elegans DPF‐3 and human DPP4 have tripeptidyl peptidase activity

open access: yesFEBS Letters, EarlyView.
The dipeptidyl peptidase IV (DPPIV) family comprises serine proteases classically defined by their ability to remove dipeptides from the N‐termini of substrates, a feature that gave the family its name. Here, we report the discovery of a previously unrecognized tripeptidyl peptidase activity in DPPIV family members from two different species.
Aditya Trivedi, Rajani Kanth Gudipati
wiley   +1 more source

MT-SOTA: A Merkle-Tree-Based Approach for Secure Software Updates over the Air in Automotive Systems

open access: yesApplied Sciences, 2023
The automotive industry has seen a dynamic transformation from traditional hardware-defined to software-defined architecture enabling higher levels of autonomy and connectivity, better safety and security features, as well as new in-vehicle experiences ...
Abir Bazzi, Adnan Shaout, Di Ma
doaj   +1 more source

Enabling Practical IPsec authentication for the Internet [PDF]

open access: yes, 2006
On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops (First International Workshop on Information Security (IS'06), OTM Federated Conferences and workshops). Montpellier, Oct,/Nov.
Delgado Kloos, Carlos   +3 more
core   +3 more sources

Liquid biopsy epigenetics: establishing a molecular profile based on cell‐free DNA

open access: yesMolecular Oncology, EarlyView.
Cell‐free DNA (cfDNA) fragments in plasma from cancer patients carry epigenetic signatures reflecting their cells of origin. These epigenetic features include DNA methylation, nucleosome modifications, and variations in fragmentation. This review describes the biological properties of each feature and explores optimal strategies for harnessing cfDNA ...
Christoffer Trier Maansson   +2 more
wiley   +1 more source

Two-Layered Multi-Factor Authentication Using Decentralized Blockchain in an IoT Environment

open access: yesSensors
Internet of Things (IoT) technology is evolving over the peak of smart infrastructure with the participation of IoT devices in a wide range of applications.
Saeed Bamashmos   +2 more
doaj   +1 more source

Secure and linear cryptosystems using error-correcting codes [PDF]

open access: yes, 2000
A public-key cryptosystem, digital signature and authentication procedures based on a Gallager-type parity-check error-correcting code are presented.
Cover T. M.   +9 more
core   +2 more sources

Class IIa HDACs forced degradation allows resensitization of oxaliplatin‐resistant FBXW7‐mutated colorectal cancer

open access: yesMolecular Oncology, EarlyView.
HDAC4 is degraded by the E3 ligase FBXW7. In colorectal cancer, FBXW7 mutations prevent HDAC4 degradation, leading to oxaliplatin resistance. Forced degradation of HDAC4 using a PROTAC compound restores drug sensitivity by resetting the super‐enhancer landscape, reprogramming the epigenetic state of FBXW7‐mutated cells to resemble oxaliplatin ...
Vanessa Tolotto   +13 more
wiley   +1 more source

Lightweight certificateless linearly homomorphic network coding signature scheme for electronic health system

open access: yesIET Information Security, 2021
With the flourishing development of the Internet of Things (IoT), the electronic health system (EHS) as a leading technology has attracted widespread attention. However, the unsatisfactory network transmission throughput hinders practical applications of
Yumei Li, Futai Zhang, Yinxia Sun
doaj   +1 more source

Home - About - Disclaimer - Privacy