Results 61 to 70 of about 58,711 (310)
Research and Implementation of MQTT Security Mechanism Based on Domestic CryptographicAlgorithms [PDF]
Aiming at the problem that existing MQTT protocol lacks effective identity authentication and data plaintext transmission,an MQTT security protection scheme is designed based on domestic cryptography algorithms SM2,SM3 and SM4.Two-way identity ...
LIU Zechao, LIANG Tao, SUN Ruochen, HAO Zhiqiang, LI Jun
doaj +1 more source
ABSTRACT Background B‐acute lymphoblastic leukemia (B‐ALL) is the most common pediatric cancer, and while most children in high‐resource settings are cured, therapy carries risks for long‐term toxicities. Understanding parents’ concerns about these late effects is essential to guide anticipatory support and inform evolving therapeutic approaches ...
Kellee N. Parker +7 more
wiley +1 more source
A New Code-Based Identity-Based Signature Scheme from the Ternary Large-Weight SDP
Identity-based cryptography introduced by Shamir (Crypto’84) has seen many advances through the years. In the context of post-quantum identity-based schemes, most of the efficient designs are based on lattices.
Sana Challi +2 more
doaj +1 more source
Leakage-Resilient Certificate-Based Signature Resistant to Side-Channel Attacks
Certificate-based cryptography is an attractive public-key setting, and it not only simplifies certificate management in the traditional public-key cryptography but also eliminates the key escrow problem inherent in the identity-based cryptography ...
Jui-Di Wu +3 more
doaj +1 more source
Atovaquone is an antimalarial requiring potentiation for sufficient efficacy. We pursued strategies to enhance its activity, showing that 4‐nitrobenzoate inhibits 4‐hydroxybenzoate polyprenyltransferase, decreasing ubiquinone biosynthesis. Since atovaquone competes with ubiquinol in mitochondria, 4‐nitrobenzoate facilitates its action, potentiating ...
Ignasi Bofill Verdaguer +7 more
wiley +1 more source
Certificateless Blind Signature Based on DLP [PDF]
The most widely used digital signature in the real word application such as e cash e-voting etc. is blind signature. Previously the proposed blind signature follow the foot steps of public key cryptography(PKC) but conventional public key cryptography ...
Kumar, Samir
core
A Cre‐dependent lentiviral vector for neuron subtype‐specific expression of large proteins
We designed a versatile and modular lentivector comprising a Cre‐dependent switch and self‐cleaving 2A peptide and tested it for co‐expression of GFP and a 2.8 kb gene of interest (GOI) in mouse cortical parvalbumin (PV+) interneurons and midbrain dopamine (TH+) neurons.
Weixuan Xue +6 more
wiley +1 more source
Security and Privacy Issues in Wireless Mesh Networks: A Survey
This book chapter identifies various security threats in wireless mesh network (WMN). Keeping in mind the critical requirement of security and user privacy in WMNs, this chapter provides a comprehensive overview of various possible attacks on different ...
A. Gupta +73 more
core +1 more source
The Caenorhabditis elegans DPF‐3 and human DPP4 have tripeptidyl peptidase activity
The dipeptidyl peptidase IV (DPPIV) family comprises serine proteases classically defined by their ability to remove dipeptides from the N‐termini of substrates, a feature that gave the family its name. Here, we report the discovery of a previously unrecognized tripeptidyl peptidase activity in DPPIV family members from two different species.
Aditya Trivedi, Rajani Kanth Gudipati
wiley +1 more source
Special Issue on Entropy-Based Applied Cryptography and Enhanced Security for Ubiquitous Computing
Entropy is a basic and important concept in information theory. It is also often used as a measure of the unpredictability of a cryptographic key in cryptography research areas.
James (Jong Hyuk) Park, Wanlei Zhou
doaj +1 more source

