Results 81 to 90 of about 299,742 (318)

Quantum Resistant Random Linear Code Based Public Key Encryption Scheme RLCE [PDF]

open access: yes, 2015
Lattice based encryption schemes and linear code based encryption schemes have received extensive attention in recent years since they have been considered as post-quantum candidate encryption schemes.
Wang, Yongge
core   +2 more sources

Effective Caching for the Secure Content Distribution in Information-Centric Networking

open access: yes, 2018
The secure distribution of protected content requires consumer authentication and involves the conventional method of end-to-end encryption. However, in information-centric networking (ICN) the end-to-end encryption makes the content caching ineffective ...
Bilal, Muhammad   +2 more
core   +1 more source

TRAF2 binds to TIFA via a novel motif and contributes to its autophagic degradation

open access: yesFEBS Letters, EarlyView.
TRAF family members couple receptor signalling complexes to downstream outputs, but how they interact with these complexes is not always clear. Here, we show that during ADP‐heptose signalling, TRAF2 binding to TIFA requires two short sequence motifs in the C‐terminal tail of TIFA, which are distinct from the TRAF6 binding motif.
Tom Snelling   +4 more
wiley   +1 more source

The epithelial barrier theory proposes a comprehensive explanation for the origins of allergic and other chronic noncommunicable diseases

open access: yesFEBS Letters, EarlyView.
Exposure to common noxious agents (1), including allergens, pollutants, and micro‐nanoplastics, can cause epithelial barrier damage (2) in our body's protective linings. This may trigger an immune response to our microbiome (3). The epithelial barrier theory explains how this process can lead to chronic noncommunicable diseases (4) affecting organs ...
Can Zeyneloglu   +17 more
wiley   +1 more source

Uncloneable encryption

open access: yesQuantum Information and Computation, 2003
Quantum states cannot be cloned. I show how to extend this property to classical messages encoded using quantum states, a task I call ``uncloneable encryption.'' An uncloneable encryption scheme has the property that an eavesdropper Eve not only cannot read the encrypted message, but she cannot copy it down for later decoding.
openaire   +2 more sources

Classification of Encrypted Text and Encrypted Speech

open access: yesDefence Science Journal, 2010
The information to be exchanged between two parties can be text data or speech data. This data is encrypted for its security and communicated (to the other end). When an adversary intercepts these encrypted data then in order to recover the actual information, his first step is to identify whether intercepted data is encrypted text or encrypted speech ...
Neelam Verma, Rajesh Asthana
openaire   +2 more sources

Goodbye flat lymphoma biology

open access: yesFEBS Letters, EarlyView.
Three‐dimensional (3D) biological systems have become key tools in lymphoma research, offering reliable in vitro and ex vivo platforms to explore pathogenesis and support precision medicine. This review highlights current 3D non‐Hodgkin lymphoma models, detailing their features, advantages, and limitations, and provides a broad perspective on future ...
Carla Faria   +3 more
wiley   +1 more source

From omics to AI—mapping the pathogenic pathways in type 2 diabetes

open access: yesFEBS Letters, EarlyView.
Integrating multi‐omics data with AI‐based modelling (unsupervised and supervised machine learning) identify optimal patient clusters, informing AI‐driven accurate risk stratification. Digital twins simulate individual trajectories in real time, guiding precision medicine by matching patients to targeted therapies.
Siobhán O'Sullivan   +2 more
wiley   +1 more source

ERBIN limits epithelial cell plasticity via suppression of TGF‐β signaling

open access: yesFEBS Letters, EarlyView.
In breast and lung cancer patients, low ERBIN expression correlates with poor clinical outcomes. Here, we show that ERBIN inhibits TGF‐β‐induced epithelial‐to‐mesenchymal transition in NMuMG breast and A549 lung adenocarcinoma cell lines. ERBIN suppresses TGF‐β/SMAD signaling and reduces TGF‐β‐induced ERK phosphorylation.
Chao Li   +3 more
wiley   +1 more source

Homomorphic Encryption

open access: yesProcedia Computer Science, 2013
AbstractThe study of homomorphic encryption techniques has led to significant advancements in the computing domain, particularly in the sphere of cloud computing. Homomorphic encryption provides a means for securely transmitting and storing confidential information across and in a computer system.
Ogburn, Monique   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy