Results 41 to 50 of about 95,937 (277)

Mycobacterial cell division arrest and smooth‐to‐rough envelope transition using CRISPRi‐mediated genetic repression systems

open access: yesFEBS Open Bio, EarlyView.
CRISPRI‐mediated gene silencing and phenotypic exploration in nontuberculous mycobacteria. In this Research Protocol, we describe approaches to control, monitor, and quantitatively assess CRISPRI‐mediated gene silencing in M. smegmatis and M. abscessus model organisms.
Vanessa Point   +7 more
wiley   +1 more source

A simple relation of guessing probability in quantum key distribution

open access: yesNew Journal of Physics, 2022
Given a communication system using quantum key distribution (QKD), the receiver can be seen as one who tries to guess the sender’s information just as potential eavesdroppers do.
Hong-Yi Su
doaj   +1 more source

Information-Theoretic Security Without an Honest Majority [PDF]

open access: yes, 2007
We present six multiparty protocols with information-theoretic security that tolerate an arbitrary number of corrupt participants. All protocols assume pairwise authentic private channels and a broadcast channel (in a single case, we require a simultaneous broadcast channel).
Broadbent, Anne, Tapp, Alain
openaire   +2 more sources

Effects of Causal Beliefs About Gout on Public Views About Gout Management: A Randomized Experimental Study

open access: yesArthritis Care &Research, EarlyView.
Objective Despite well‐described biologic causes, the public views unhealthy lifestyle choices as the primary cause of gout. This study investigated how causal beliefs about gout influence the public's views about its management. Methods In a randomized study, 201 members of the public viewed one of two 2‐minute videos about gout.
Rachel Murdoch   +6 more
wiley   +1 more source

A Stronger Soft-Covering Lemma and Applications

open access: yes, 2015
Wyner's soft-covering lemma is a valuable tool for achievability proofs of information theoretic security, resolvability, channel synthesis, and source coding.
Cuff, Paul
core   +1 more source

Thermodynamic Pathways of Nonequilibrium Solidification in Wire‐Arc Additive Manufacturing Fe‐Based Multicomponent Alloy Structures

open access: yesAdvanced Engineering Materials, EarlyView.
Geometry‐driven thermal behavior in wire‐arc additive manufacturing (WAAM) influences microstructural evolution during nonequilibrium solidification of a chemically complex Fe–Cr–Nb–W–Mo–C nanocomposite system. By comparing different deposits configurations, distinct entropy–cooling rate correlations, segregation, and carbide evolution are revealed ...
Blanca Palacios   +5 more
wiley   +1 more source

Two Semantics of Trust Management Language with Negation

open access: yesJournal of Telecommunications and Information Technology, 2013
The family of Role-based Trust management languages is used for representing security policies by defining a formalism, which uses credentials to handle trust in decentralized, distributed access control systems.
Anna Felkner
doaj   +1 more source

Private Key and Decoder Side Information for Secure and Private Source Coding

open access: yesEntropy, 2022
We extend the problem of secure source coding by considering a remote source whose noisy measurements are correlated random variables used for secure source reconstruction.
Onur Günlü   +3 more
doaj   +1 more source

PROPYLA: Privacy Preserving Long-Term Secure Storage

open access: yes, 2018
An increasing amount of sensitive information today is stored electronically and a substantial part of this information (e.g., health records, tax data, legal documents) must be retained over long time periods (e.g., several decades or even centuries ...
Bayer Dave   +9 more
core   +1 more source

Photoswitching Conduction in Framework Materials

open access: yesAdvanced Functional Materials, EarlyView.
This mini‐review summarizes recent advances in state‐of‐the‐art proton and electron conduction in framework materials that can be remotely and reversibly switched on and off by light. It discusses the various photoswitching conduction mechanisms and the strategies employed to enhance photoswitched conductivity.
Helmy Pacheco Hernandez   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy