Results 221 to 230 of about 59,119 (273)
ALDOA Promotes Glycolysis and NLRP3/GSDMD Pyroptosis to Accelerate ALS Progression
ABSTRACT Objective Amyotrophic lateral sclerosis (ALS) is characterized by progressive motor neuron degeneration. Glycolytic dysregulation is implicated in disease progression, yet the underlying mechanisms remain unclear. This study investigates how Aldolase A (ALDOA) drives ALS progression through glycolysisâmediated motor neuron pyroptosis.
Kaixin Yan +9 more
wiley +1 more source
Two secure authentication protocols for mitigating vulnerabilities in IoD. [PDF]
Safkhani M, Ghorbani Fard M.
europepmc +1 more source
Enhanced EAADE: a quantum-resilient and privacy-preserving authentication protocol for secure data exchange in vehicular social networks. [PDF]
Alrashdi R +7 more
europepmc +1 more source
Linkable Ring Signature for Privacy Protection in Blockchain-Enabled IIoT. [PDF]
Guo F +5 more
europepmc +1 more source
Secure authentication using a multidimensional retinal biometric encryption method. [PDF]
Banu Y, Rath BK, Gountia D.
europepmc +1 more source
Quantum-aware secure blockchain intrusion detection system for industrial IoT networks. [PDF]
Hussain N +4 more
europepmc +1 more source
Bio-inspired cryptography based on proteinoid assemblies. [PDF]
Mougkogiannis P, Ghadafi E, Adamatzky A.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Multi-identity management for identity-based cryptography
Journal of Discrete Mathematical Sciences and Cryptography, 2008Abstract In identity-based (or ID-based) cryptography, user identities can be employed as public keys, where each public key maps a unique private key generated by a trusted authority usually called Private Key Generator (PKG). In some situations, a user could hold multiple identities; therefore, he has to manage the same number of private keys.
Mu, Yi, Chen, Zhide, Guo, Fuchun
openaire +3 more sources
Identity Based Cryptography Using Matrices
Wireless Personal Communications, 2021A new method of identity (ID) based Elgamal type encryption/decryption is described. The technique uses rectangular integer matrices in finite field Zp, as the private keys. Adoption of modular arithmetic limits the size of the elements of the key matrices while maintaining reasonably high security levels.
B. S. Sahana Raj, Venugopalachar Sridhar
openaire +1 more source

