Results 41 to 50 of about 81,733 (278)

Structural instability impairs function of the UDP‐xylose synthase 1 Ile181Asn variant associated with short‐stature genetic syndrome in humans

open access: yesFEBS Letters, EarlyView.
The Ile181Asn variant of human UDP‐xylose synthase (hUXS1), associated with a short‐stature genetic syndrome, has previously been reported as inactive. Our findings demonstrate that Ile181Asn‐hUXS1 retains catalytic activity similar to the wild‐type but exhibits reduced stability, a looser oligomeric state, and an increased tendency to precipitate ...
Tuo Li   +2 more
wiley   +1 more source

Lattice-Based Privacy-Preserving and Forward-Secure Cloud Storage Public Auditing Scheme

open access: yesIEEE Access, 2020
Aiming at reducing the local storage burden and computational costs, numerous individuals and enterprises are willing to outsource their data to the cloud server.
Haifeng Li   +4 more
doaj   +1 more source

Design and analysis of group key exchange protocols [PDF]

open access: yes, 2010
A group key exchange (GKE) protocol allows a set of parties to agree upon a common secret session key over a public network. In this thesis, we focus on designing efficient GKE protocols using public key techniques and appropriately revising security ...
Gorantla, Malakondayya Choudary
core   +1 more source

TLS in the wild: an Internet-wide analysis of TLS-based protocols for electronic communication

open access: yes, 2016
The majority of electronic communication today happens either via email or chat. Thanks to the use of standardised protocols electronic mail (SMTP, IMAP, POP3) and instant chat (XMPP, IRC) servers can be deployed in a decentralised but interoperable ...
Amann, Johanna   +4 more
core   +1 more source

Tau acetylation at K331 has limited impact on tau pathology in vivo

open access: yesFEBS Letters, EarlyView.
We mapped tau post‐translational modifications in humanized MAPT knock‐in mice and in amyloid‐bearing double knock‐in mice. Acetylation within the repeat domain, particularly around K331, showed modest increases under amyloid pathology. To test functional relevance, we generated MAPTK331Q knock‐in mice.
Shoko Hashimoto   +3 more
wiley   +1 more source

Perancangan Spesifikasi Keamanan untuk Pengembangan Aplikasi Secure Chat Berdasarkan Common Criteria For It Security Evaluation

open access: yesJurnal Teknologi Informasi dan Ilmu Komputer, 2021
Spesifikasi keamanan sangat penting bagi pengembangan aplikasi chatting karena dapat menentukan tingkat keamanan aplikasi yang tentunya akan berdampak pada kepercayaan pengguna.
Amiruddin Amiruddin   +1 more
doaj   +1 more source

Tighter Reductions for Forward-Secure Signature Schemes [PDF]

open access: yes, 2013
In this paper, we revisit the security of factoring-based signature schemes built via the Fiat-Shamir transform and show that they can admit tighter reductions to certain decisional complexity assumptions such as the quadratic-residuosity, the high-residuosity, and the φ- hiding assumptions.
Abdalla, Michel   +2 more
openaire   +2 more sources

Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives [PDF]

open access: yes, 2017
Using dynamic Searchable Symmetric Encryption, a user with limited storage resources can securely outsource a database to an untrusted server, in such a way that the database can still be searched and updated efficiently.
Bost, Raphael   +2 more
core   +2 more sources

PARP inhibition and pharmacological ascorbate demonstrate synergy in castration‐resistant prostate cancer

open access: yesMolecular Oncology, EarlyView.
Pharmacologic ascorbate (vitamin C) increases ROS, disrupts cellular metabolism, and induces DNA damage in CRPC cells. These effects sensitize tumors to PARP inhibition, producing synergistic growth suppression with olaparib in vitro and significantly delayed tumor progression in vivo. Pyruvate rescue confirms ROS‐dependent activity.
Nicolas Gordon   +13 more
wiley   +1 more source

A Note on Quantum-Secure PRPs [PDF]

open access: yesQuantum
We show how to construct pseudorandom permutations (PRPs) that remain secure even if the adversary can query the permutation, both in the forward and reverse directions, on a quantum superposition of inputs.
Mark Zhandry
doaj   +1 more source

Home - About - Disclaimer - Privacy