Results 21 to 30 of about 186,193 (271)

Efficient identity-based key encapsulation to multiple parties [PDF]

open access: yes, 2005
We introduce the concept of identity based key encapsulation to multiple parties (mID-KEM), and define a security model for it. This concept is the identity based analogue of public key KEM to multiple parties.
Barbosa, Manuel, Farshim, P.
core   +2 more sources

Application of Physical-Chemical Approaches for Encapsulation of Active Substances in Pharmaceutical and Food Industries

open access: yesFoods, 2023
Background: Encapsulation is a valuable method used to protect active substances and enhance their physico-chemical properties. It can also be used as protection from unpleasant scents and flavors or adverse environmental conditions.
David Řepka   +3 more
doaj   +1 more source

The parallel lives of polysaccharides in food and pharmaceutical formulations [PDF]

open access: yes, 2015
The present opinion article discusses how polysaccharide structures can be used in both food and pharmaceutical formulations. We distinguish two regions depending on moisture content where polysaccharides form structures with distinct functional ...
Kontogiorgos, Vassilis   +2 more
core   +1 more source

Droplet-based digital antibiotic susceptibility screen reveals single-cell clonal heteroresistance in an isogenic bacterial population [PDF]

open access: yes, 2020
Since antibiotic resistance is a major threat to global health, recent observations that the traditional test of minimum inhibitory concentration (MIC) is not informative enough to guide effective antibiotic treatment are alarming.
Debski, Pawel R.   +9 more
core   +1 more source

LSA project technology development update [PDF]

open access: yes, 1978
The state of low cost solar array technology is discussed.
Bickler, D. B., Goldsmith, J. V.
core   +2 more sources

INAKA: Improved Authenticated Key Agreement Protocol Based on Newhope

open access: yesIEEE Access, 2020
The Newhope scheme is one of the milestones of the study in key agreement protocol but it lacks the anti-active-attack capability. In this article, we propose a mutual authenticated key agreement scheme named INAKA scheme based on the commitment value ...
Yatao Yang   +5 more
doaj   +1 more source

Riboflavin: The Health Benefits of a Forgotten Natural Vitamin [PDF]

open access: yes, 2020
Riboflavin (RF) is a water-soluble member of the B-vitamin family. Sufficient dietary and supplemental RF intake appears to have a protective effect on various medical conditions such as sepsis, ischemia etc., while it also contributes to the reduction ...
Bäumler, Hans   +4 more
core   +1 more source

Lack of phenotypic and evolutionary cross-resistance against parasitoids and pathogens in Drosophila melanogaster [PDF]

open access: yes, 2012
BackgroundWhen organisms are attacked by multiple natural enemies, the evolution of a resistance mechanism to one natural enemy will be influenced by the degree of cross-resistance to another natural enemy.
A Fytrou   +52 more
core   +2 more sources

Erythrocytes as Carriers of Therapeutic Enzymes. [PDF]

open access: yes, 2020
Therapeutic enzymes are administered for the treatment of a wide variety of diseases. They exert their effects through binding with a high affinity and specificity to disease-causing substrates to catalyze their conversion to a non-noxious product, to ...
Bax, BE
core   +1 more source

What Can Information Encapsulation Tell Us About Emotional Rationality? [PDF]

open access: yes, 2019
What can features of cognitive architecture, e.g. the information encapsulation of certain emotion processing systems, tell us about emotional rationality?
D Evans   +14 more
core   +1 more source

Home - About - Disclaimer - Privacy