Results 91 to 100 of about 459,845 (362)
Quantum Resistant Random Linear Code Based Public Key Encryption Scheme RLCE [PDF]
Lattice based encryption schemes and linear code based encryption schemes have received extensive attention in recent years since they have been considered as post-quantum candidate encryption schemes.
Wang, Yongge
core +2 more sources
Spinal muscular atrophy (SMA) is a genetic disease affecting motor neurons. Individuals with SMA experience mitochondrial dysfunction and oxidative stress. The aim of the study was to investigate the effect of an antioxidant and neuroprotective substance, ergothioneine (ERGO), on an SMNΔ7 mouse model of SMA.
Francesca Cadile +8 more
wiley +1 more source
AUTOMATING THE DATA SECURITY PROCESS [PDF]
Contemporary organizations face big data security challenges in the cyber environment due to modern threats and actual business working model which relies heavily on collaboration, data sharing, tool integration, increased mobility, etc.
Florin Ogigau-Neamtiu
doaj
Implementasi Algoritma Kriptografi RSA untuk Enkripsi dan Dekripsi Email
In the world of Internet nothing is really safe. There's always a gap in any application made. Likewise in email delivery. To minimize attacks on the data transmission is usually applied cryptography.
Albert Ginting +2 more
doaj +1 more source
Quantum states cannot be cloned. I show how to extend this property to classical messages encoded using quantum states, a task I call ``uncloneable encryption.'' An uncloneable encryption scheme has the property that an eavesdropper Eve not only cannot read the encrypted message, but she cannot copy it down for later decoding.
openaire +2 more sources
Microbial exopolysaccharide production by polyextremophiles in the adaptation to multiple extremes
Polyextremophiles are microorganisms that endure multiple extreme conditions by various adaptation strategies that also include the production of exopolysaccharides (EPSs). This review provides an integrated perspective on EPS biosynthesis, function, and regulation in these organisms, emphasizing their critical role in survival and highlighting their ...
Tracey M Gloster, Ebru Toksoy Öner
wiley +1 more source
Data Security Protection in Cloud Computing by using Encryption [PDF]
Cloud computing is a paradigm for offer information technology services on the Internet, such as hardware, software, networking and also the storage can be accessed anywhere at any time on a pay-per-use basis.
Asst. Lec. Ghassan Sabeeh Mahmood
doaj +1 more source
Nicotinamide (NIC) and nicotinic acid (NIA) are proposed as stress signaling compounds in plants. Oxidative stress may lead to single strand breaks (SSB) in DNA, which activate poly(ADP‐ribose) polymerase (PARP). NIC and NIA are then formed from NAD. NIC and NIA can promote epigenetic changes leading to the expression of defense genes specific for the ...
Torkel Berglund, Anna B. Ohlsson
wiley +1 more source
QIoTChain: Quantum IoT‐blockchain fusion for advanced data protection in Industry 4.0
The modern world has its foundation built on data. Data is generated all the time, and many aspects of the society and economy are built upon it. In today's world, data is employed in better decision‐making, innovation, and improving the efficiency of ...
Aditya Kumar Sharma +3 more
doaj +1 more source
A working model for cytoplasmic assembly of H/ACA snoRNPs
Dyskerin is the component of nuclear H/ACA ribonucleoproteins (RNPs) endowed with pseudouridine synthase catalytic activity. Two isoforms of human dyskerin have been characterized: the abundant Iso1, mainly nuclear, and the shorter Iso3, mainly cytoplasmic but occasionally imported into nuclei.
Alberto Angrisani, Maria Furia
wiley +1 more source

