Results 31 to 40 of about 13,015 (291)

Biomaterials‐based nanoparticles conjugated to regulatory T cells provide a modular system for localized delivery of pharmacotherapeutic agents

open access: yesJournal of Biomedical Materials Research Part A, Volume 111, Issue 2, Page 185-197, February 2023., 2023
Abstract Type 1 diabetes (T1D) presents with two therapeutic challenges: the need to correct underlying autoimmunity and restore β‐cell mass. We harnessed the unique capacity of regulatory T cells (Tregs) and the T cell receptor (TCR) to direct tolerance induction along with tissue‐localized delivery of therapeutic agents to restore endogenous β‐cell ...
Gregory P. Marshall   +7 more
wiley   +1 more source

Cryptanalysis of the Tiger Hash Function [PDF]

open access: yes, 2007
Tiger is a cryptographic hash function with a 192-bit hash value. It was proposed by Anderson and Biham in 1996. Recently, weaknesses have been shown in round-reduced variants of the Tiger hash function. First, at FSE 2006, Kelsey and Lucks presented a collision attack on Tiger reduced to 16 and 17 (out of 24) rounds with a complexity of about 244 and ...
Mendel, Florian, Rijmen, Vincent
openaire   +3 more sources

Insights into molecular cluster materials with adamantane‐like core structures by considering dimer interactions

open access: yesJournal of Computational Chemistry, Volume 44, Issue 7, Page 843-856, March 15, 2023., 2023
Abstract A class of adamantane‐like molecular materials attracts attention because they exhibit an extreme non‐linear optical response and emit a broad white‐light spectrum after illumination with a continuous‐wave infrared laser source. According to recent studies, not only the nature of the cluster molecules, but also the macroscopic structure of the
Sebastian Schwan   +7 more
wiley   +1 more source

Fast Counterfeit RFID Tags Detection With Slot Constraints

open access: yesIEEE Access, 2023
RFID tags are prone to counterfeit attacks in supply chain scenarios. The attacker often uses counterfeit tags to replace stolen tags to avoid being detected by the inventory process.
Bing Zhang, Xu Hu, Shan Gao
doaj   +1 more source

Efficient space‐time adaptivity for parabolic evolution equations using wavelets in time and finite elements in space

open access: yesNumerical Linear Algebra with Applications, Volume 30, Issue 1, January 2023., 2023
Abstract Considering the space‐time adaptive method for parabolic evolution equations we introduced in Stevenson et al., this work discusses an implementation of the method in which every step is of linear complexity. Exploiting the tensor‐product structure of the space‐time cylinder, the method allows for a family of trial spaces given as spans of ...
Raymond van Venetië, Jan Westerdiep
wiley   +1 more source

Deck-Based Wide Block Cipher Modes and an Exposition of the Blinded Keyed Hashing Model

open access: yesIACR Transactions on Symmetric Cryptology, 2020
We present two tweakable wide block cipher modes from doubly-extendable cryptographic keyed (deck) functions and a keyed hash function: double-decker and docked-double-decker.
Aldo Gunsing, Joan Daemen, Bart Mennink
doaj   +1 more source

Moral awareness and its relationship with moral sensitivity among Iranian nursing students: A basis for nursing ethics education

open access: yesNursing Open, Volume 10, Issue 2, Page 773-780, February 2023., 2023
Abstract Aim This descriptive‐analytical correlational study was carried out to examine moral awareness and its relationship with moral sensitivity among Iranian nursing students. Design A descriptive‐analytical correlational study. Methods The present descriptive‐analytical study was performed among 140 Iranian nursing students.
Parvin Rahmani   +4 more
wiley   +1 more source

Adolescent cannabis use and the later onset of bipolar disorder: protocol for a systematic review and meta‐analysis of prospective cohort studies

open access: yesNeuropsychopharmacology Reports, Volume 42, Issue 4, Page 538-542, December 2022., 2022
Abstract Background Cannabis is used by adolescents worldwide. Adolescents are more susceptible to the psychological effects of cannabis because their brains are still developing. Cannabis use in adolescents has been reportedly associated with later onset of bipolar disorder.
Naonori Yasuma   +4 more
wiley   +1 more source

Can There Be a Two Way Hash Function?

open access: yesIEEE Access
It is computationally impossible for one-way hash functions to obtain the original data again. In this study, Two Way Hash Function (TWHF) is proposed which provides the security properties of one-way hash functions. TWHF aims to hash/encrypt and decrypt
Timucin Koroglu, Refik Samet
doaj   +1 more source

A Novel Hash Function Based on a Chaotic Sponge and DNA Sequence

open access: yesIEEE Access, 2021
Many chaos-based hash functions have convoluted designs that are not based on proper design principles, complicating the verification of security claims.
Moatsum Alawida   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy