Results 41 to 50 of about 327,487 (331)
The utilization of mobile learning continues to rise and has attracted many organizations, university environments and institutions of higher education all over the world.
Ghadah Aldabbagh +5 more
doaj +1 more source
Reciprocal control of viral infection and phosphoinositide dynamics
Phosphoinositides, although scarce, regulate key cellular processes, including membrane dynamics and signaling. Viruses exploit these lipids to support their entry, replication, assembly, and egress. The central role of phosphoinositides in infection highlights phosphoinositide metabolism as a promising antiviral target.
Marie Déborah Bancilhon, Bruno Mesmin
wiley +1 more source
On Using Encryption Techniques to Enhance Sticky Policies Enforcement [PDF]
How to enforce privacy policies to protect sensitive personal data has become an urgent research topic for security researchers, as very little has been done in this field apart from some ad hoc research efforts.
Tang, Qiang
core +6 more sources
SEPCVN: Secure and Efficient Protocol for Cloud Vehicular Networking
Cloud vehicular networking is a relatively new inter-vehicle communication paradigm. The ability of cloud vehicular networking to address critical safety issues in road traffic is highly rated by operators.
Vinod Kumar +5 more
doaj +1 more source
A Secure Steganographic Channel Using DNA Sequence Data and a Bio-Inspired XOR Cipher
Secure communication is becoming an urgent need in a digital world where tera bytes of sensitive information are sent back and forth over public networks.
Amal Khalifa
doaj +1 more source
Fluorescent probes allow dynamic visualization of phosphoinositides in living cells (left), whereas mass spectrometry provides high‐sensitivity, isomer‐resolved quantitation (right). Their synergistic use captures complementary aspects of lipid signaling. This review illustrates how these approaches reveal the spatiotemporal regulation and quantitative
Hiroaki Kajiho +3 more
wiley +1 more source
In the digital security environment, the obfuscation and encryption of mali-cious scripts are primary attack methods used to evade detection. Thesescripts—easily spread through websites, emails, and file downloads—can beautomatically executed on users ...
Kookjin Kim +3 more
doaj +1 more source
A Wireless Sensor Network (WSN) is a collection of sensors that communicate or track a specific object. It is used in many fields of war, architecture, or espionage, but the wireless sensor network faces challenges in securing the path or the message ...
Haneen Mohammed Hussein +2 more
doaj +1 more source
Persistent issues in encryption software: A heuristic and cognitive walkthrough [PDF]
The support information accompanying security software can be difficult to understand by end-users, who have little knowledge in cyber security.
El-Abed, Jad, Szewczyk, Patryk S
core +1 more source
Protein pyrophosphorylation by inositol pyrophosphates — detection, function, and regulation
Protein pyrophosphorylation is an unusual signaling mechanism that was discovered two decades ago. It can be driven by inositol pyrophosphate messengers and influences various cellular processes. Herein, we summarize the research progress and challenges of this field, covering pathways found to be regulated by this posttranslational modification as ...
Sarah Lampe +3 more
wiley +1 more source

