Results 41 to 50 of about 95,937 (277)
CRISPRI‐mediated gene silencing and phenotypic exploration in nontuberculous mycobacteria. In this Research Protocol, we describe approaches to control, monitor, and quantitatively assess CRISPRI‐mediated gene silencing in M. smegmatis and M. abscessus model organisms.
Vanessa Point +7 more
wiley +1 more source
A simple relation of guessing probability in quantum key distribution
Given a communication system using quantum key distribution (QKD), the receiver can be seen as one who tries to guess the sender’s information just as potential eavesdroppers do.
Hong-Yi Su
doaj +1 more source
Information-Theoretic Security Without an Honest Majority [PDF]
We present six multiparty protocols with information-theoretic security that tolerate an arbitrary number of corrupt participants. All protocols assume pairwise authentic private channels and a broadcast channel (in a single case, we require a simultaneous broadcast channel).
Broadbent, Anne, Tapp, Alain
openaire +2 more sources
Objective Despite well‐described biologic causes, the public views unhealthy lifestyle choices as the primary cause of gout. This study investigated how causal beliefs about gout influence the public's views about its management. Methods In a randomized study, 201 members of the public viewed one of two 2‐minute videos about gout.
Rachel Murdoch +6 more
wiley +1 more source
A Stronger Soft-Covering Lemma and Applications
Wyner's soft-covering lemma is a valuable tool for achievability proofs of information theoretic security, resolvability, channel synthesis, and source coding.
Cuff, Paul
core +1 more source
Geometry‐driven thermal behavior in wire‐arc additive manufacturing (WAAM) influences microstructural evolution during nonequilibrium solidification of a chemically complex Fe–Cr–Nb–W–Mo–C nanocomposite system. By comparing different deposits configurations, distinct entropy–cooling rate correlations, segregation, and carbide evolution are revealed ...
Blanca Palacios +5 more
wiley +1 more source
Two Semantics of Trust Management Language with Negation
The family of Role-based Trust management languages is used for representing security policies by defining a formalism, which uses credentials to handle trust in decentralized, distributed access control systems.
Anna Felkner
doaj +1 more source
Private Key and Decoder Side Information for Secure and Private Source Coding
We extend the problem of secure source coding by considering a remote source whose noisy measurements are correlated random variables used for secure source reconstruction.
Onur Günlü +3 more
doaj +1 more source
PROPYLA: Privacy Preserving Long-Term Secure Storage
An increasing amount of sensitive information today is stored electronically and a substantial part of this information (e.g., health records, tax data, legal documents) must be retained over long time periods (e.g., several decades or even centuries ...
Bayer Dave +9 more
core +1 more source
Photoswitching Conduction in Framework Materials
This mini‐review summarizes recent advances in state‐of‐the‐art proton and electron conduction in framework materials that can be remotely and reversibly switched on and off by light. It discusses the various photoswitching conduction mechanisms and the strategies employed to enhance photoswitched conductivity.
Helmy Pacheco Hernandez +4 more
wiley +1 more source

