Results 41 to 50 of about 7,578 (241)
Digital signatures over hash-entangled chains [PDF]
In this work we introduce a new approach for digital signature based on hash chains. The method is supported on the well known security principles of hash functions. Some main advantages of this public key system include security and estimated efficiency through the so called signature chains.
openaire +1 more source
Pulmonary hypertension (PH) is a progressive condition with high morbidity and mortality, largely owing to right ventricular (RV) failure resulting from maladaptive remodeling. Our study provides strong evidence in support of a critical, detrimental role for AXL as a previously unrecognized determinant driving RV fibrotic pathology in PH.
Li‐Wei Wu +17 more
wiley +1 more source
Secure broadcasting is an essential feature for critical operations in wireless sensor network (WSNs). However, due to the limited resources of sensor networks, verifying the authenticity for broadcasted messages is a very difficult issue.
Eun-Suk Cho +3 more
doaj +1 more source
NAD⁺ homeostasis maintains neuronal integrity through opposing actions of NMNAT2 and SARM1. Loss of NMNAT2 in glutamatergic neurons reprograms cortical metabolism from glucose to lipid catabolism, depletes lipid stores, and triggers inflammation and neurodegeneration.
Zhen‐Xian Niou +9 more
wiley +1 more source
Mechanism‐Driven Screening of Membrane‐Targeting and Pore‐Forming Antimicrobial Peptides
To combat antibiotic resistance, this study employs mechanism‐driven screening with machine learning to identify pore‐forming antimicrobial peptides from amphibian and human metaproteomes. Seven peptides are validated, showing minimal toxicity and membrane disruption.
Jiaxuan Li +9 more
wiley +1 more source
Time‐restricted feeding (TRF) exerts protein‐dependent neuroprotective effects in an MPTP‐induced Parkinson's disease model. In casein‐fed mice, TRF improves gut barrier integrity and reduces neuroinflammation, possibly via modulation of Allobaculum and BCAAs.
Ting Li +12 more
wiley +1 more source
Analysis and Test of Storage Algorithm of Card Reader of Personnel Positioning System
The paper analyzed three storage algorithms of chain storage algorithm, hash table storage algorithm and hash binary tree storage algorithm which are applicable to the card reader of personnel positioning system in term of search time and storage ...
ZHANG Feng, XU Zhao, ZHANG Kai-ting
doaj
Digital signatures over HMAC entangled chains
In this work we present a new digital signature method based on hash chains and the hash message authentication code (HMAC). Unlike Blockchain technology, our approach establishes that the database of transactions is distributed among users, so each one ...
Luis Adrián Lizama-Pérez
doaj +1 more source
Fast Verification of Hash Chains [PDF]
A hash chain is a sequence of hash values x i = hash(x i − 1) for some initial secret value x 0. It allows to reveal the final value x n and to gradually disclose the pre-images x n − 1, x n − 2, ... whenever necessary. The correctness of a given value x i can then be verified by re-computing the chain and comparing the result to x n .
openaire +1 more source
Machine Learning for Green Solvents: Assessment, Selection and Substitution
Environmental regulations have intensified demand for green solvents, but discovery is limited by Solvent Selection Guides (SSGs) that quantify solvent sustainability. Training a machine learning model on GlaxoSmithKline SSG, a database of sustainability metrics for 10,189 solvents, GreenSolventDB is developed. Integrated with Hansen solubility metrics,
Rohan Datta +4 more
wiley +1 more source

