Results 71 to 80 of about 264,588 (256)

SECURE AND EFFICIENT LIGHTWEIGHT CRYPTOGRAPHIC ALGORITHM FOR RESOURCE-CONSTRAINED IOMT APPLICATIONS: L6AES [PDF]

open access: yesProceedings on Engineering Sciences
The Internet of Medical Things has revolutionised patient care through continuous remote monitoring and diagnostics. However, directly applying conventional AES encryption to resource-constrained IoMT devices poses challenges due to high computational ...
Cyrus Mehra , Arvind K. Sharma
doaj   +1 more source

PICALM::MLLT10 translocated leukemia

open access: yesFEBS Letters, EarlyView.
This comprehensive review of PICALM::MLLT10 translocated acute leukemia provides an in‐depth review of the structure and function of CALM, AF10, and the fusion oncoprotein (1). The multifaceted molecular mechanisms of oncogenesis, including nucleocytoplasmic shuttling (2), epigenetic modifications (3), and disruption of endocytosis (4), are then ...
John M. Cullen   +7 more
wiley   +1 more source

Application of novel security technique in cloud environment using attribute dependent authentication for health care

open access: yesAutomatika
Users of the cloud have been given access to high-quality, on-demand services, without being concerned about the sustaining infrastructure and software. While increasing the security concerns for private and confidential information, this brings emphasis
D. Deena Rose, C. Agees Kumar
doaj   +1 more source

Inhibiting stearoyl‐CoA desaturase suppresses bone metastatic prostate cancer by modulating cellular stress, mTOR signaling, and DNA damage response

open access: yesFEBS Letters, EarlyView.
Bone metastasis in prostate cancer (PCa) patients is a clinical hurdle due to the poor understanding of the supportive bone microenvironment. Here, we identify stearoyl‐CoA desaturase (SCD) as a tumor‐promoting enzyme and potential therapeutic target in bone metastatic PCa.
Alexis Wilson   +7 more
wiley   +1 more source

A Lossless Layered-Based Non-Encoding Plain Text Compression and Encryption Algorithm Utilizing Binary Fragmentation and Defragmentation Technique

open access: yesIEEE Access
This paper proposes an innovative fusion of encryption and compression techniques that optimizes data handling and security. The approach employs a layered non-encoding encryption-compression algorithm DQRc (Data in Quick Response Code) that attempts to ...
Pratham Mishra   +4 more
doaj   +1 more source

Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube [PDF]

open access: yes, 2019
Cryptographic algorithms play an important role in information security where it ensures the security of data across the network or storage. A key schedule algorithm is the mechanism that generates and schedules all session-keys for the encryption ...
Mushtaq, Muhammad Faheem
core  

The (Glg)ABCs of cyanobacteria: modelling of glycogen synthesis and functional divergence of glycogen synthases in Synechocystis sp. PCC 6803

open access: yesFEBS Letters, EarlyView.
We reconstituted Synechocystis glycogen synthesis in vitro from purified enzymes and showed that two GlgA isoenzymes produce glycogen with different architectures: GlgA1 yields denser, highly branched glycogen, whereas GlgA2 synthesizes longer, less‐branched chains.
Kenric Lee   +3 more
wiley   +1 more source

RESEARCH OF PARAMETERS OF ENCODING OF THE ALGORITHM WITH VARIABLE FRAGMENTATION OF THE UNIT

open access: yesСистемный анализ и прикладная информатика, 2018
This article presents recommendations on the selection of parameters of the encryption algorithm with variable fragmentation of the block, developed on the basis of a study of the obtained results of the algorithm with different encryption parameters (p ...
K. O. Zakharova
doaj   +1 more source

Structural biology of ferritin nanocages

open access: yesFEBS Letters, EarlyView.
Ferritin is a conserved iron‐storage protein that sequesters iron as a ferric mineral core within a nanocage, protecting cells from oxidative damage and maintaining iron homeostasis. This review discusses ferritin biology, structure, and function, and highlights recent cryo‐EM studies revealing mechanisms of ferritinophagy, cellular iron uptake, and ...
Eloise Mastrangelo, Flavio Di Pisa
wiley   +1 more source

SEDEA: State Estimation-Based Dynamic Encryption and Authentication in Smart Grid

open access: yesIEEE Access, 2017
A state estimation-based dynamic encryption and authentication (SEDEA) approach is proposed to protect the communication between the control center (CC) and remote terminal units (RTUs) in the smart grid, including the measurements reported from RTUs and
Ting Liu   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy