A secure multi phase authentication protocol for cloud infrastructure using elliptic curve cryptography. [PDF]
Sivasankar R, Marikkannan M.
europepmc +1 more source
This paper presents a programmable metasurface‐based Meta Key Distribution (MKD) system for secure, protocol‐independent key exchange in indoor wireless settings. By embedding entropy into the wireless channel, it enables lightweight, compatible cryptographic key generation.
Xinyu Li +7 more
wiley +1 more source
Cleanifier: contamination removal from microbial sequences using spaced seeds of a human pangenome index. [PDF]
Zentgraf J, Schmitz JE, Rahmann S.
europepmc +1 more source
Mechanism‐Driven Screening of Membrane‐Targeting and Pore‐Forming Antimicrobial Peptides
To combat antibiotic resistance, this study employs mechanism‐driven screening with machine learning to identify pore‐forming antimicrobial peptides from amphibian and human metaproteomes. Seven peptides are validated, showing minimal toxicity and membrane disruption.
Jiaxuan Li +9 more
wiley +1 more source
Sybil-resistant and privacy-preserving authentication based on short-term pseudonym for internet of vehicles. [PDF]
Zhang C +4 more
europepmc +1 more source
Confirmation of a Non‐Transiting Planet in the Habitable Zone of the Nearby M Dwarf L 98‐59
ABSTRACT Only 40 exoplanetary systems with five or more planets are currently known. These systems are crucial for our understanding of planet formation and planet‐planet interaction. The M dwarf L 98‐59 has previously been found to show evidence of five planets, three of which are transiting.
Paul I. Schwarz +2 more
wiley +1 more source
An Efficient Clinical Decision Support Framework Using IoMT Based on Explainable and Trustworthy Artificial Intelligence with Transformer Model and Blockchain-Integrated Chunking. [PDF]
Arslanoğlu K, Karaköse M.
europepmc +1 more source
Stall‐Free Asynchronous State Repartitioning With a Proactive Workload Tracking Window
ABSTRACT High‐throughput stateful applications rely on dynamic data repartitioning to adapt to changing workloads, but this process presents significant challenges. This paper provides a detailed analysis of such challenges, drilling down into the tradeoffs between adaptation, computational overhead, and service availability. We identify that a primary
Douglas Pereira Luiz +1 more
wiley +1 more source
Anonymous and Efficient Chaotic Map-Based Authentication Protocol for Industrial Internet of Things. [PDF]
Zeng D +6 more
europepmc +1 more source
A deeper understanding of the natural killer cell gene expression regulation driving NK cell maturation and cytotoxicity could provide critical insights into optimizing NK therapies. Our findings reveal novel enhancers governing NK cell genes for NCAM1/CD56 and cis‐regulation for KIR receptors and clarify existing models of NK cell cis‐accessibility ...
Mariam A. Salem +9 more
wiley +1 more source

