Results 51 to 60 of about 104,367 (277)
Propuesta de inclusión del criptosistema triple des 96en ssl/tls record protocol [PDF]
TESIS DE INVESTIGACIÓN CIENTIFICA EL PRESENTE TRABAJO DE INVESTIGACIÓN SE CENTRA EN EL SSL/TLS RECORD PROTOCOL DONDE SE CONSTRUYE LA INCLUSIÓN DE TRIPLE DES 96 EN LA MENCIONADA SUITE DE CIFRADODebido a la seguridad requerida al momento de intercambiar ...
FILIO AGUILAR, PEDRO DAVID +1 more
core
Effective Caching for the Secure Content Distribution in Information-Centric Networking
The secure distribution of protected content requires consumer authentication and involves the conventional method of end-to-end encryption. However, in information-centric networking (ICN) the end-to-end encryption makes the content caching ineffective ...
Bilal, Muhammad +2 more
core +1 more source
Comparing P2PTV Traffic Classifiers [PDF]
Peer-to-Peer IP Television (P2PTV) applications represent one of the fastest growing application classes on the Internet, both in terms of their popularity and in terms of the amount of traffic they generate.
Cascarano, Niccolo' +6 more
core +1 more source
LDAcoop: Integrating non‐linear population dynamics into the analysis of clonogenic growth in vitro
Limiting dilution assays (LDAs) quantify clonogenic growth by seeding serial dilutions of cells and scoring wells for colony formation. The fraction of negative wells is plotted against cells seeded and analyzed using the non‐linear modeling of LDAcoop.
Nikko Brix +13 more
wiley +1 more source
IP Links in multihop ad hoc wireless networks? [PDF]
International audienceA number of efforts currently aim at scalable and efficient mobile ad hoc routing, an essential piece concerning the integration of such networks in the Internet.
Baccelli, Emmanuel +3 more
core +2 more sources
Full TCP/IP for 8-Bit architectures [PDF]
We describe two small and portable TCP/IP implementations fulfilling the subset of RFC1122 requirements needed for full host-to-host interoperability. Our TCP/IP implementations do not sacrifice any of TCP's mechanisms such as urgent data or congestion ...
Dunkels, Adam
core +3 more sources
Peroxidasin enables melanoma immune escape by inhibiting natural killer cell cytotoxicity
Peroxidasin (PXDN) is secreted by melanoma cells and binds the NK cell receptor NKG2D, thereby suppressing NK cell activation and cytotoxicity. PXDN depletion restores NKG2D signaling and enables effective NK cell–mediated melanoma killing. These findings identify PXDN as a previously unrecognized immune evasion factor and a potential target to improve
Hsu‐Min Sung +17 more
wiley +1 more source
Towards a Secure Smart Grid Storage Communications Gateway
This research in progress paper describes the role of cyber security measures undertaken in an ICT system for integrating electric storage technologies into the grid.
Marksteiner, Stefan, Vallant, Heribert
core +1 more source
Etoposide induces DNA damage, activating p53‐dependent apoptosis via caspase‐3/7, which cleaves PARP1. Dammarenediol II enhances this apoptotic pathway by suppressing O‐GlcNAc transferase activity, further decreasing O‐GlcNAcylation. The reduction in O‐GlcNAc levels boosts p53‐driven apoptosis and influences the Akt/GSK3β/mTOR signaling pathway ...
Jaehoon Lee +8 more
wiley +1 more source
Conformance test suite for implementations of the security protocol suite IPsec v2
The paper presents conformance test suite for new Internet Protocol Security Suite IPsec v2. The test suite was constructed by means of the UniTESK automated testing technology and its implementation, CTESK toolkit.The work was done in the Institute for ...
A. V. Nikeshin +2 more
doaj

