Results 41 to 50 of about 7,578 (241)

Digital signatures over hash-entangled chains [PDF]

open access: yesSN Applied Sciences, 2019
In this work we introduce a new approach for digital signature based on hash chains. The method is supported on the well known security principles of hash functions. Some main advantages of this public key system include security and estimated efficiency through the so called signature chains.
openaire   +1 more source

Inactivation of AXL in Cardiac Fibroblasts Alleviates Right Ventricular Remodeling in Pulmonary Hypertension

open access: yesAdvanced Science, EarlyView.
Pulmonary hypertension (PH) is a progressive condition with high morbidity and mortality, largely owing to right ventricular (RV) failure resulting from maladaptive remodeling. Our study provides strong evidence in support of a critical, detrimental role for AXL as a previously unrecognized determinant driving RV fibrotic pathology in PH.
Li‐Wei Wu   +17 more
wiley   +1 more source

Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem

open access: yesSensors, 2010
Secure broadcasting is an essential feature for critical operations in wireless sensor network (WSNs). However, due to the limited resources of sensor networks, verifying the authenticity for broadcasted messages is a very difficult issue.
Eun-Suk Cho   +3 more
doaj   +1 more source

NAD⁺ Reduction in Glutamatergic Neurons Induces Lipid Catabolism and Neuroinflammation in the Brain via SARM1

open access: yesAdvanced Science, EarlyView.
NAD⁺ homeostasis maintains neuronal integrity through opposing actions of NMNAT2 and SARM1. Loss of NMNAT2 in glutamatergic neurons reprograms cortical metabolism from glucose to lipid catabolism, depletes lipid stores, and triggers inflammation and neurodegeneration.
Zhen‐Xian Niou   +9 more
wiley   +1 more source

Mechanism‐Driven Screening of Membrane‐Targeting and Pore‐Forming Antimicrobial Peptides

open access: yesAdvanced Science, EarlyView.
To combat antibiotic resistance, this study employs mechanism‐driven screening with machine learning to identify pore‐forming antimicrobial peptides from amphibian and human metaproteomes. Seven peptides are validated, showing minimal toxicity and membrane disruption.
Jiaxuan Li   +9 more
wiley   +1 more source

Neuroprotective Effects of Time‐Restricted Feeding Combined With Different Protein Sources in MPTP‐Induced Parkinson's Disease Mice Model and Its Modulatory Impact on Gut Microbiota Metabolism

open access: yesAdvanced Science, EarlyView.
Time‐restricted feeding (TRF) exerts protein‐dependent neuroprotective effects in an MPTP‐induced Parkinson's disease model. In casein‐fed mice, TRF improves gut barrier integrity and reduces neuroinflammation, possibly via modulation of Allobaculum and BCAAs.
Ting Li   +12 more
wiley   +1 more source

Analysis and Test of Storage Algorithm of Card Reader of Personnel Positioning System

open access: yesGong-kuang zidonghua, 2012
The paper analyzed three storage algorithms of chain storage algorithm, hash table storage algorithm and hash binary tree storage algorithm which are applicable to the card reader of personnel positioning system in term of search time and storage ...
ZHANG Feng, XU Zhao, ZHANG Kai-ting
doaj  

Digital signatures over HMAC entangled chains

open access: yesEngineering Science and Technology, an International Journal, 2022
In this work we present a new digital signature method based on hash chains and the hash message authentication code (HMAC). Unlike Blockchain technology, our approach establishes that the database of transactions is distributed among users, so each one ...
Luis Adrián Lizama-Pérez
doaj   +1 more source

Fast Verification of Hash Chains [PDF]

open access: yes, 2004
A hash chain is a sequence of hash values x i = hash(x i − 1) for some initial secret value x 0. It allows to reveal the final value x n and to gradually disclose the pre-images x n − 1, x n − 2, ... whenever necessary. The correctness of a given value x i can then be verified by re-computing the chain and comparing the result to x n .
openaire   +1 more source

Machine Learning for Green Solvents: Assessment, Selection and Substitution

open access: yesAdvanced Science, EarlyView.
Environmental regulations have intensified demand for green solvents, but discovery is limited by Solvent Selection Guides (SSGs) that quantify solvent sustainability. Training a machine learning model on GlaxoSmithKline SSG, a database of sustainability metrics for 10,189 solvents, GreenSolventDB is developed. Integrated with Hansen solubility metrics,
Rohan Datta   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy