Results 81 to 90 of about 561,825 (309)
PDAKE: A Provably Secure PUF-Based Device Authenticated Key Exchange in Cloud Setting
In this paper, we study on how to construct an authenticated key exchange protocol in a device based authentication setting where an user who has a PUF-based device and its multi-factor authenticators desires to mutually authenticate a server. Generally,
Jin Wook Byun
doaj +1 more source
Protein O‐glycosylation in the Bacteroidota phylum
Species of the Bacteroidota phylum exhibit a unique O‐glycosylation system. It modifies noncytoplasmic proteins on a specific amino acid motif with a shared glycan core but a species‐specific outer glycan. A locus of multiple glycosyltransferases responsible for the synthesis of the outer glycan has been identified.
Lonneke Hoffmanns +2 more
wiley +1 more source
Microfluidic electro‐viscoelastic manipulation of extracellular vesicles
The electro‐viscoelastic manipulation as a potential method for separation of particles based on size. The particles introduced as a sheath flow migrate to the channel center under the influence of simultaneously applied electric field and pressure driven flow.
Seyedamirhosein Abdorahimzadeh +7 more
wiley +1 more source
A secure and efficient authenticated key exchange scheme for smart grid. [PDF]
Xia Z, Liu T, Wang J, Chen S.
europepmc +1 more source
Mimicking DH Key Exchange Over a Full Duplex Wireless Channel via Bisparse Blind Deconvolution
Gerhard Wunder +3 more
openalex +2 more sources
Deniable Internet Key Exchange [PDF]
In this work, we develop a family of non-malleable and deniable Diffie-Hellman key-exchange (DHKE) protocols, named deniable Internet keyexchange (DIKE). The newly developed DIKE protocols are of conceptual clarity, provide much remarkable privacy protection to protocol participants, and are of highly practical (online) efficiency.
Andrew C. Yao, Yunlei Zhao
openaire +1 more source
A general model for analysis of linear and hyperbolic enzyme inhibition mechanisms
We developed a general enzyme kinetic model that integrates these six basic inhibition mechanism onto a single one. From this model, we deduced a general enzyme kinetic equation that through modulation of simple parameters, γ (the relative inhibitor affinity for two binding sites) and β (the reactivity of the enzyme–substrate–inhibitor complex), is ...
Rafael S. Chagas, Sandro R. Marana
wiley +1 more source
Homologous expression and purification of human HAX‐1 for structural studies
This research protocol provides detailed instructions for cloning, expressing, and purifying large quantities of the intrinsically disordered human HAX‐1 protein, N‐terminally fused to a cleavable superfolder GFP, from mammalian cells. HAX‐1 is predicted to undergo posttranslational modifications and to interact with membranes, various cellular ...
Mariana Grieben
wiley +1 more source
Molecular determinants of signal transduction in tropomyosin receptor kinases
Tropomyosin receptor kinases control critical neuronal functions, but how do the same receptors produce diverse cellular responses? This review explores the structural mechanisms behind Trk signaling diversity, focusing on allosteric modulation and ligand bias.
Giray Enkavi
wiley +1 more source
Lithium-ion batteries are widely used as power sources for various devices, so rapid and accurate estimation of the health status of lithium-ion batteries is an important means to reduce battery failures.
Yinsen YU +8 more
doaj +1 more source

