Results 111 to 120 of about 2,989,875 (336)
A secure and efficient authenticated key exchange scheme for smart grid. [PDF]
Xia Z, Liu T, Wang J, Chen S.
europepmc +1 more source
On a new fast public key cryptosystem [PDF]
This paper presents a new fast public key cryptosystem namely : a key exchange algorithm, a public key encryption algorithm and a digital signature algorithm, based on the difficulty to invert the following function : $F(x) =(a\times x)Mod(2^p)Div(2^q)$
Bouftass, Samir
core
Mitochondria‐associated membranes (MAMs) are contact sites between the endoplasmic reticulum and mitochondria that regulate calcium signaling, lipid metabolism, autophagy, and stress responses. This review outlines their molecular organization, roles in cellular homeostasis, and how dysfunction drives neurodegeneration, metabolic disease, cancer, and ...
Viet Bui +3 more
wiley +1 more source
A general model for analysis of linear and hyperbolic enzyme inhibition mechanisms
We developed a general enzyme kinetic model that integrates these six basic inhibition mechanism onto a single one. From this model, we deduced a general enzyme kinetic equation that through modulation of simple parameters, γ (the relative inhibitor affinity for two binding sites) and β (the reactivity of the enzyme–substrate–inhibitor complex), is ...
Rafael S. Chagas, Sandro R. Marana
wiley +1 more source
On the Structure of Secret Key Exchange Protocols [PDF]
Modern cryptography is fundamentally concerned with the problem of secure private communication. Suppose two parties, Alice and Bob, wish to communicate privately over a public channel (for instance, a telephone line with an eavesdropper). If Alice and Bob are able to meet, privately, beforehand, and agree on some common secret key, then it becomes ...
Mihir Bellare +2 more
openaire +2 more sources
On the Importance of Memory Resources in the Security of Key Exchange Protocols [PDF]
George I. Davida +2 more
openalex +1 more source
Cloning, expression, purification, and structural modeling of the Chandipura virus matrix protein
This research protocol offers a guide for the cloning, expression, and purification of the Chandipura virus matrix protein using E. coli. It also includes a step‐by‐step procedure for cloning, expressing, and conducting fluorescence imaging of GFP‐fused Chandipura virus matrix protein in mammalian cell lines.
Mariana Grieben
wiley +1 more source
Tripartite authenticated key exchange protocol for smart grid
Most of the existing authentication schemes in the smart grid environment have the drawbacks of requiring manual participation or low performance, and thus do not meet the practical needs of smart grids.A new tripartite authenticated key exchange ...
Shengbao WANG +3 more
doaj
PDAKE: A Provably Secure PUF-Based Device Authenticated Key Exchange in Cloud Setting
In this paper, we study on how to construct an authenticated key exchange protocol in a device based authentication setting where an user who has a PUF-based device and its multi-factor authenticators desires to mutually authenticate a server. Generally,
Jin Wook Byun
doaj +1 more source
Cross-country evidence on the relation between equity prices and the current account [PDF]
This paper explores the relationship between equity prices and the current account for 17 industrialized countries in the period 1980-2007. Based on a panel vector autoregression, I compare the effects of equity price shocks to those originating from ...
Berg, Tim Oliver
core

