Results 41 to 50 of about 6,099,057 (328)

Ephemeral Keys Authenticated with Merkle Trees and Their Use in IoT Applications

open access: yesSensors, 2021
Public key algorithms based on quasi-cyclic binary moderate-density parity-check codes (QC-MDPCs) and QC low-density parity-check codes (QC-LDPCs) codes for key encapsulation and encryption submitted to the NIST post-quantum competition (Bit Flipping Key
Pavol Zajac
doaj   +1 more source

Erythrocytes as Carriers of Therapeutic Enzymes. [PDF]

open access: yes, 2020
Therapeutic enzymes are administered for the treatment of a wide variety of diseases. They exert their effects through binding with a high affinity and specificity to disease-causing substrates to catalyze their conversion to a non-noxious product, to ...
Bax, BE
core   +1 more source

The parallel lives of polysaccharides in food and pharmaceutical formulations [PDF]

open access: yes, 2015
The present opinion article discusses how polysaccharide structures can be used in both food and pharmaceutical formulations. We distinguish two regions depending on moisture content where polysaccharides form structures with distinct functional ...
Kontogiorgos, Vassilis   +2 more
core   +1 more source

Application of Physical-Chemical Approaches for Encapsulation of Active Substances in Pharmaceutical and Food Industries

open access: yesFoods, 2023
Background: Encapsulation is a valuable method used to protect active substances and enhance their physico-chemical properties. It can also be used as protection from unpleasant scents and flavors or adverse environmental conditions.
David Řepka   +3 more
doaj   +1 more source

Secured Electronic Voting System Using RSA Key Encapsulation Mechanism

open access: yesEuropean Journal of Electrical Engineering and Computer Science, 2022
A secured process whereas enumerating and casting of votes with the electronic aids with aim of improving the performance of electoral system is called E-voting (Electronic voting).
B. O. Ahubele, L. U. Oghenekaro
semanticscholar   +1 more source

Lack of phenotypic and evolutionary cross-resistance against parasitoids and pathogens in Drosophila melanogaster [PDF]

open access: yes, 2012
BackgroundWhen organisms are attacked by multiple natural enemies, the evolution of a resistance mechanism to one natural enemy will be influenced by the degree of cross-resistance to another natural enemy.
A Fytrou   +52 more
core   +2 more sources

Droplet-based digital antibiotic susceptibility screen reveals single-cell clonal heteroresistance in an isogenic bacterial population [PDF]

open access: yes, 2020
Since antibiotic resistance is a major threat to global health, recent observations that the traditional test of minimum inhibitory concentration (MIC) is not informative enough to guide effective antibiotic treatment are alarming.
Debski, Pawel R.   +9 more
core   +1 more source

Attack on the Edon-kKey Encapsulation Mechanism [PDF]

open access: yes2018 IEEE International Symposium on Information Theory (ISIT), 2018
The key encapsulation mechanism Edon-K was proposed in response to the call for post-quantum cryptography standardization issued by the National Institute of Standards and Technologies (NIST). This scheme is inspired by the McEliece scheme but uses another family of codes defined over $\mathbb{F}_{2^{128}}$ instead of $\mathbb{F}_2$ and is not based on
Lequesne, Matthieu, Tillich, Jean-Pierre
openaire   +4 more sources

LSA project technology development update [PDF]

open access: yes, 1978
The state of low cost solar array technology is discussed.
Bickler, D. B., Goldsmith, J. V.
core   +2 more sources

INAKA: Improved Authenticated Key Agreement Protocol Based on Newhope

open access: yesIEEE Access, 2020
The Newhope scheme is one of the milestones of the study in key agreement protocol but it lacks the anti-active-attack capability. In this article, we propose a mutual authenticated key agreement scheme named INAKA scheme based on the commitment value ...
Yatao Yang   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy