Results 171 to 180 of about 59,173 (313)
Vehicle-to-Vehicle Secure Communication Protocol Based on Digital Vehicle Identification Number. [PDF]
Escapa Gordón P +2 more
europepmc +1 more source
Promiscuous stimulation of HSP70 ATPase activity by parasite‐derived J‐domains
The malaria parasite Plasmodium falciparum exports three highly homologous yet functionally divergent J‐domain proteins into human erythrocytes. Here, we show that J‐domains isolated from all three proteins effectively stimulate the ATPase activity of both endogenous host and exported parasite HSP70 chaperones.
Julian Barth +6 more
wiley +1 more source
A Lightweight Authentication and Key Distribution Protocol for XR Glasses Using PUF and Cloud-Assisted ECC. [PDF]
Cha W, Lee HJ, Kook S, Kim K, Won D.
europepmc +1 more source
A scalable and secure networking paradigm using identity-based cryptography
Sammy Kwok Hon-man
openalex +1 more source
Single‐molecule DNA flow‐stretch assays for high‐throughput DNA–protein interaction studies
We describe an optimised single‐molecule DNA flow‐stretch assay that visualises DNA–protein interactions in real time. Linear DNA fragments are tethered to a surface and stretched by buffer flow for fluorescence imaging. Using λ and φX174 DNA, this protocol enhances reproducibility and accessibility, providing a versatile approach for studying diverse ...
Ayush Kumar Ganguli +8 more
wiley +1 more source
A Quantum Proxy Signature Scheme Without Restrictions on the Identity and Number of Verifiers. [PDF]
Xiong S.
europepmc +1 more source
Amino acids sequence of two different proteins with the same sequence (chameleon sequence—black boxes) represent in 3D structure of the proteins different secondary structures: HHHH—helical and BBB—Beta‐structural. The chains folded in water environment adopt different III‐order structures in which the chameleon fragments appear to adopt similar status
Irena Roterman +4 more
wiley +1 more source
A Lightweight Certificateless Authenticated Key Agreement Scheme Based on Chebyshev Polynomials for the Internet of Drones. [PDF]
Li Z, Ju Z, Zhao H, Wei Z, Lan G.
europepmc +1 more source
A Java Library for Identity Based Cryptography
This Thesis provides a library for Identity Based Cryptography (IBC) that is able to be used for key generation, encryption and decryption in Identity Based systems.
openaire +1 more source

