Results 101 to 110 of about 2,989,875 (336)
Diffusion‐based size determination of solute particles: a method adapted for postsynaptic proteins
We present a diffusion‐based approach for measuring the size of macromolecules and their complexes, and demonstrate its use on postsynaptic proteins. The method requires fluorescein‐labelled protein samples, a microfluidic device that maintains laminar flow for said samples, a microscope recording the emitted fluorescent signals, and an analytic ...
András László Szabó +7 more
wiley +1 more source
Verifier-based anonymous password-authenticated key exchange protocol in the standard model
Anonymous password-authenticated key exchange (APAKE) allows a client to authenticate herself and to establish a secure session key with a remote server via only a low-entropy password, while keeping her actual identity anonymous to the third party as ...
Qihui Zhang +4 more
doaj +1 more source
Deniable Internet Key Exchange [PDF]
In this work, we develop a family of non-malleable and deniable Diffie-Hellman key-exchange (DHKE) protocols, named deniable Internet keyexchange (DIKE). The newly developed DIKE protocols are of conceptual clarity, provide much remarkable privacy protection to protocol participants, and are of highly practical (online) efficiency.
Yunlei Zhao, Andrew Chi-Chih Yao
openaire +2 more sources
Report on the 2nd MObility for Vesicle research in Europe (MOVE) symposium—2024
The 2nd MObility for Vesicle research in Europe (MOVE) Symposium in Belgrade brought over 280 attendees from 28 countries to advance extracellular vesicle (EV) research. Featuring keynotes, presentations, and industry sessions, it covered EV biogenesis, biomarkers, therapies, and manufacturing.
Dorival Mendes Rodrigues‐Junior +5 more
wiley +1 more source
Three-party password authenticated key agreement protocol with user anonymity based on lattice
With the rapid development of quantum theory and the existence of polynomial algorithm in quantum computation based on discrete logarithm problem and large integer decomposition problem,the security of the algorithm was seriously threatened.Therefore,two
Caifen WANG, Li CHEN
doaj
Transport properties in Simplified Double Exchange model
Transport properties of the manganites by the double-exchange mechanism are considered. The system is modeled by a simplified double-exchange model, i.e.
Coery J. M. D. +5 more
core +1 more source
Angubindin‐1 binds angulin‐1/‐3 at tricellular tight junctions, enhancing intestinal macromolecule permeation. Alanine scanning identified six essential residues (L562, L598, E638, V640, Y643, and K644) of angubindin‐1 critical for binding to angulin‐1/‐3 and permeation‐enhancing activity, providing insights for the development of targeted noninvasive ...
Taiki Kuzu +8 more
wiley +1 more source
Analysis of the Telegram Key Exchange
Lecture Notes in Computer Science ...
Martin R. Albrecht +4 more
openaire +2 more sources
Here, we introduced an intermittent electrical stimulation protocol mimicking the episodic nature of real‐life exercise in vitro by alternating low‐ and high‐frequency stimulation. In comparison with widely used continuous stimulation, it enhanced the rate of glucose and fatty acid oxidation, but not the myokine release.
Klára Gabrišová +11 more
wiley +1 more source
Sarcosine oxidase from Bacillus sp. (SoxB) recognizes l‐proline (l‐Pro), d‐proline (d‐Pro), and l‐thioproline (l‐Tpr) as minor substrates. In this study, we measured their absorption spectra, determined the crystal structures of their enzyme complexes, and performed site‐directed mutagenesis of key residues.
Yuqi Zhang +5 more
wiley +1 more source

