Results 31 to 40 of about 13,015 (291)
Abstract Type 1 diabetes (T1D) presents with two therapeutic challenges: the need to correct underlying autoimmunity and restore β‐cell mass. We harnessed the unique capacity of regulatory T cells (Tregs) and the T cell receptor (TCR) to direct tolerance induction along with tissue‐localized delivery of therapeutic agents to restore endogenous β‐cell ...
Gregory P. Marshall+7 more
wiley +1 more source
Cryptanalysis of the Tiger Hash Function [PDF]
Tiger is a cryptographic hash function with a 192-bit hash value. It was proposed by Anderson and Biham in 1996. Recently, weaknesses have been shown in round-reduced variants of the Tiger hash function. First, at FSE 2006, Kelsey and Lucks presented a collision attack on Tiger reduced to 16 and 17 (out of 24) rounds with a complexity of about 244 and ...
Mendel, Florian, Rijmen, Vincent
openaire +3 more sources
Abstract A class of adamantane‐like molecular materials attracts attention because they exhibit an extreme non‐linear optical response and emit a broad white‐light spectrum after illumination with a continuous‐wave infrared laser source. According to recent studies, not only the nature of the cluster molecules, but also the macroscopic structure of the
Sebastian Schwan+7 more
wiley +1 more source
Fast Counterfeit RFID Tags Detection With Slot Constraints
RFID tags are prone to counterfeit attacks in supply chain scenarios. The attacker often uses counterfeit tags to replace stolen tags to avoid being detected by the inventory process.
Bing Zhang, Xu Hu, Shan Gao
doaj +1 more source
Abstract Considering the space‐time adaptive method for parabolic evolution equations we introduced in Stevenson et al., this work discusses an implementation of the method in which every step is of linear complexity. Exploiting the tensor‐product structure of the space‐time cylinder, the method allows for a family of trial spaces given as spans of ...
Raymond van Venetië, Jan Westerdiep
wiley +1 more source
Deck-Based Wide Block Cipher Modes and an Exposition of the Blinded Keyed Hashing Model
We present two tweakable wide block cipher modes from doubly-extendable cryptographic keyed (deck) functions and a keyed hash function: double-decker and docked-double-decker.
Aldo Gunsing, Joan Daemen, Bart Mennink
doaj +1 more source
Abstract Aim This descriptive‐analytical correlational study was carried out to examine moral awareness and its relationship with moral sensitivity among Iranian nursing students. Design A descriptive‐analytical correlational study. Methods The present descriptive‐analytical study was performed among 140 Iranian nursing students.
Parvin Rahmani+4 more
wiley +1 more source
Abstract Background Cannabis is used by adolescents worldwide. Adolescents are more susceptible to the psychological effects of cannabis because their brains are still developing. Cannabis use in adolescents has been reportedly associated with later onset of bipolar disorder.
Naonori Yasuma+4 more
wiley +1 more source
Can There Be a Two Way Hash Function?
It is computationally impossible for one-way hash functions to obtain the original data again. In this study, Two Way Hash Function (TWHF) is proposed which provides the security properties of one-way hash functions. TWHF aims to hash/encrypt and decrypt
Timucin Koroglu, Refik Samet
doaj +1 more source
A Novel Hash Function Based on a Chaotic Sponge and DNA Sequence
Many chaos-based hash functions have convoluted designs that are not based on proper design principles, complicating the verification of security claims.
Moatsum Alawida+5 more
doaj +1 more source