Results 91 to 100 of about 230,478 (367)
Unraveling Mycobacterium tuberculosis acid resistance and pH homeostasis mechanisms
Mycobacterium tuberculosis exhibits a remarkable resilience to acid stress. In this Review, we discuss some of the molecular mechanisms and metabolic pathways used by the tubercle bacilli to adapt and resist host‐mediated acid stress. Mycobacterium tuberculosis (Mtb) is a successful pathogen that has developed a variety of strategies to survive and ...
Janïs Laudouze+3 more
wiley +1 more source
PE-AONT: Partial Encryption combined with an All-or-Nothing Transform [PDF]
In this report, we introduce PE-AONT: a novel algorithm for fast and secure data fragmentation. Initial data are fragmented and only a selected subset of the fragments is encrypted. Further, fragments are transformed using a variation of an all-or-nothing transform that blends encrypted and non-encrypted fragments. By encrypting data only partially, we
arxiv
Checking chordality on homomorphically encrypted graphs [PDF]
The breakthrough of achieving fully homomorphic encryption sparked enormous studies on where and how to apply homomorphic encryption schemes so that operations can be performed on encrypted data without the secret key while still obtaining the correct outputs.
arxiv
The S1025 peptide is the major antidote to the YrzI toxin, which we renamed here as SpyT (Small Peptide YrzI Toxin) and SpyA (Small Peptide YrzI Antitoxin) (1). Degradation of the toxin–antitoxin spyTA mRNA, either by a translation‐dependent cleavage by the endoribonuclease Rae1 (2) or by direct attack by 3′‐exoribonucleases (3), also contributes to ...
Laetitia Gilet+4 more
wiley +1 more source
An Efficient Image Encryption Scheme Based on the LSS Chaotic Map and Single S-Box
This paper presents an efficient and secure chaotic S-Box based image encryption algorithm. Firstly, by cryptanalyzing a multiple chaotic S-Boxes based image encryption algorithm, we successfully cracked the cryptosystem by using chosen-plaintext attack (
Qing Lu, Congxu Zhu, Xiaoheng Deng
semanticscholar +1 more source
Venom peptides have shown promise in treating pain. Our study uses computer screening to identify a peptide that targets a sodium channel (NaV1.7) linked to chronic pain. We produced the peptide in the laboratory and refined its design, advancing the search for innovative pain therapies.
Gagan Sharma+8 more
wiley +1 more source
E-voting System Using Homomorphic Encryption and Blockchain Technology to Encrypt Voter Data [PDF]
Homomorphic encryption and blockchain technology are regarded as two significant technologies for improving e-voting systems. In this paper, we suggest a novel e-voting system using homomorphic encryption and blockchain technology that is focused on encrypting voter data.
arxiv
Classification of Encrypted Text and Encrypted Speech
The information to be exchanged between two parties can be text data or speech data. This data is encrypted for its security and communicated (to the other end). When an adversary intercepts these encrypted data then in order to recover the actual information, his first step is to identify whether intercepted data is encrypted text or encrypted speech ...
Neelam Verma, Rajesh Asthana
openaire +2 more sources
Identification of novel small molecule inhibitors of ETS transcription factors
ETS transcription factors play an essential role in tumourigenesis and are indispensable for sprouting angiogenesis, a hallmark of cancer, which fuels tumour expansion and dissemination. Thus, targeting ETS transcription factor function could represent an effective, multifaceted strategy to block tumour growth. The evolutionarily conserved E‐Twenty‐Six
Shaima Abdalla+9 more
wiley +1 more source
A Bijective Image Encryption System Based on Hybrid Chaotic Map Diffusion and DNA Confusion
Modern multimedia communications technology requirements have raised security standards, which allows for enormous development in security standards. This article presents an innovative symmetric cryptosystem that depends on the hybrid chaotic Lorenz ...
Dalia H. ElKamchouchi+2 more
doaj +1 more source