Results 231 to 240 of about 23,383 (317)
Implementation of Matrix based Mapping Method Using Elliptic Curve Cryptography
G. Geetha, Padmaja Jain
openalex +1 more source
Synergistic Composite: Fabrication and Evaluation of Continuous and Chopped Fiber Reinforced PEEK Matrix. ABSTRACT Enhancing the mechanical properties of 3D‐printed thermoplastic composites has become a critical focus in advanced manufacturing, particularly for high‐performance materials like PEEK.
Altuğ Uşun+2 more
wiley +1 more source
Cereal‐legume intercropping is a promising strategy for sustainable agroecosystems, leveraging the biological complementarities between plant species to reduce the need for inputs while enhancing field biodiversity. Here, we focused on maize‐bean intercropping, which is experiencing a revival in conventional agricultural settings.
Noa Vazeux‐Blumental+18 more
wiley +1 more source
ECAE: An Efficient Certificateless Aggregate Signature Scheme Based on Elliptic Curves for NDN-IoT Environments. [PDF]
Wang C, Wu H, Gan Y, Zhang R, Ma M.
europepmc +1 more source
An Efficient Organizational Signature Schemes based on the Elliptic Curve Cryptography
Shereen M. Mahgoub+2 more
openalex +1 more source
The women honoured in flowering plant genera: From myth to reality
Many flowering plant genera are named for people, but there is a gender gap in this naming, with only 6% of eponyms honouring women. Here we explore this gap by examining in detail women for whom plant genera are named. Our open shared dataset serves to make women honoured in plant genera more discoverable, resulting in further impact by allowing ...
Sabine von Mering+6 more
wiley +1 more source
An optimized elliptic curve digital signature strategy for resource-constrained devices. [PDF]
Sabbry NH, Levina A.
europepmc +1 more source
Energy-efficient implementations of GF (p) and GF(2m) elliptic curve cryptography
Andrew David Targhetta+3 more
openalex +2 more sources
ABSTRACT Since its first appearance in China, the molecular evolution of SARS‐CoV‐2 has progressed through altering the properties of the Spike protein, changing the virus ability to transmit and to evade host immune surveillance. Despite receiving less attention than the Receptor Binding Domain (RBD), the Spike N‐Terminal Domain (NTD) is crucial to ...
Miriana Quaranta+2 more
wiley +1 more source