Results 71 to 80 of about 264,588 (256)
SECURE AND EFFICIENT LIGHTWEIGHT CRYPTOGRAPHIC ALGORITHM FOR RESOURCE-CONSTRAINED IOMT APPLICATIONS: L6AES [PDF]
The Internet of Medical Things has revolutionised patient care through continuous remote monitoring and diagnostics. However, directly applying conventional AES encryption to resource-constrained IoMT devices poses challenges due to high computational ...
Cyrus Mehra , Arvind K. Sharma
doaj +1 more source
PICALM::MLLT10 translocated leukemia
This comprehensive review of PICALM::MLLT10 translocated acute leukemia provides an in‐depth review of the structure and function of CALM, AF10, and the fusion oncoprotein (1). The multifaceted molecular mechanisms of oncogenesis, including nucleocytoplasmic shuttling (2), epigenetic modifications (3), and disruption of endocytosis (4), are then ...
John M. Cullen +7 more
wiley +1 more source
Users of the cloud have been given access to high-quality, on-demand services, without being concerned about the sustaining infrastructure and software. While increasing the security concerns for private and confidential information, this brings emphasis
D. Deena Rose, C. Agees Kumar
doaj +1 more source
Bone metastasis in prostate cancer (PCa) patients is a clinical hurdle due to the poor understanding of the supportive bone microenvironment. Here, we identify stearoyl‐CoA desaturase (SCD) as a tumor‐promoting enzyme and potential therapeutic target in bone metastatic PCa.
Alexis Wilson +7 more
wiley +1 more source
This paper proposes an innovative fusion of encryption and compression techniques that optimizes data handling and security. The approach employs a layered non-encoding encryption-compression algorithm DQRc (Data in Quick Response Code) that attempts to ...
Pratham Mishra +4 more
doaj +1 more source
Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube [PDF]
Cryptographic algorithms play an important role in information security where it ensures the security of data across the network or storage. A key schedule algorithm is the mechanism that generates and schedules all session-keys for the encryption ...
Mushtaq, Muhammad Faheem
core
We reconstituted Synechocystis glycogen synthesis in vitro from purified enzymes and showed that two GlgA isoenzymes produce glycogen with different architectures: GlgA1 yields denser, highly branched glycogen, whereas GlgA2 synthesizes longer, less‐branched chains.
Kenric Lee +3 more
wiley +1 more source
RESEARCH OF PARAMETERS OF ENCODING OF THE ALGORITHM WITH VARIABLE FRAGMENTATION OF THE UNIT
This article presents recommendations on the selection of parameters of the encryption algorithm with variable fragmentation of the block, developed on the basis of a study of the obtained results of the algorithm with different encryption parameters (p ...
K. O. Zakharova
doaj +1 more source
Structural biology of ferritin nanocages
Ferritin is a conserved iron‐storage protein that sequesters iron as a ferric mineral core within a nanocage, protecting cells from oxidative damage and maintaining iron homeostasis. This review discusses ferritin biology, structure, and function, and highlights recent cryo‐EM studies revealing mechanisms of ferritinophagy, cellular iron uptake, and ...
Eloise Mastrangelo, Flavio Di Pisa
wiley +1 more source
SEDEA: State Estimation-Based Dynamic Encryption and Authentication in Smart Grid
A state estimation-based dynamic encryption and authentication (SEDEA) approach is proposed to protect the communication between the control center (CC) and remote terminal units (RTUs) in the smart grid, including the measurements reported from RTUs and
Ting Liu +4 more
doaj +1 more source

