Results 111 to 120 of about 3,013,541 (287)
Lightweight ring-neighbor-based user authentication and group-key agreement for internet of drones
As mobile internet and Internet of Things technologies continue to advance, the application scenarios of peer-to-peer Internet of Drones (IoD) are becoming increasingly diverse.
Zhuo Zhao +5 more
doaj +1 more source
Political leadership, conflict, and the prospects for constitutional peace [PDF]
The emphasis on constitutional political economy has been that new rules and institutions can be devised that improve the welfare of a society. Given the number of societies that are infected with political conflict and, as a result, lower levels of ...
Jennings, Colin
core
The Ile181Asn variant of human UDP‐xylose synthase (hUXS1), associated with a short‐stature genetic syndrome, has previously been reported as inactive. Our findings demonstrate that Ile181Asn‐hUXS1 retains catalytic activity similar to the wild‐type but exhibits reduced stability, a looser oligomeric state, and an increased tendency to precipitate ...
Tuo Li +2 more
wiley +1 more source
An elected second chamber: a Conservative view [PDF]
The votes in the House of Commons in March 2007 in favour of a democratically elected second chamber represented a vital step forward in this long debate.
core
Cell wall target fragment discovery using a low‐cost, minimal fragment library
LoCoFrag100 is a fragment library made up of 100 different compounds. Similarity between the fragments is minimized and 10 different fragments are mixed into a single cocktail, which is soaked to protein crystals. These crystals are analysed by X‐ray crystallography, revealing the binding modes of the bound fragment ligands.
Kaizhou Yan +5 more
wiley +1 more source
Cryptanalysis of Ateniese–Steiner–Tsudik-Authenticated Group Key Management Protocol
We present an active attack that targets Ateniese et al.’s authenticated group key agreement, which, as a particular case, includes the well-known multiparty key exchange protocol CLIQUES that allows a group of users to build a common secret using some ...
Daniel Camazón Portela +2 more
doaj +1 more source
We reconstituted Synechocystis glycogen synthesis in vitro from purified enzymes and showed that two GlgA isoenzymes produce glycogen with different architectures: GlgA1 yields denser, highly branched glycogen, whereas GlgA2 synthesizes longer, less‐branched chains.
Kenric Lee +3 more
wiley +1 more source
Structural biology of ferritin nanocages
Ferritin is a conserved iron‐storage protein that sequesters iron as a ferric mineral core within a nanocage, protecting cells from oxidative damage and maintaining iron homeostasis. This review discusses ferritin biology, structure, and function, and highlights recent cryo‐EM studies revealing mechanisms of ferritinophagy, cellular iron uptake, and ...
Eloise Mastrangelo, Flavio Di Pisa
wiley +1 more source
Key Agreement Protocol Using Elliptic Curve Matrix Power Function [PDF]
* Work is partially supported by the Lithuanian State Science and Studies Foundation.The key agreement protocol (KAP) using elliptic curve matrix power function is presented.
Katvickis, Artūras, Vitkus, Paulius
core
We identified a systemic, progressive loss of protein S‐glutathionylation—detected by nonreducing western blotting—alongside dysregulation of glutathione‐cycle enzymes in both neuronal and peripheral tissues of Taiwanese SMA mice. These alterations were partially rescued by SMN antisense oligonucleotide therapy, revealing persistent redox imbalance as ...
Sofia Vrettou, Brunhilde Wirth
wiley +1 more source

