Results 81 to 90 of about 3,657 (190)

Christian Bohr. Discoverer of Homotropic and Heterotopic Allostery

open access: yesActa Physiologica, Volume 241, Issue S734, July 2025.
ABSTRACT This essay recounts and revisits the scientific contributions of Christian Bohr, highlighting his pivotal role in discovering allostery about 120 years ago. Bohr's meticulous experimentation led to identifying two distinct forms of allostery: homotropic (single‐ligand) and heterotropic (multi‐ligand), the latter widely recognized as the Bohr ...
Niels Bindslev
wiley   +1 more source

The Network’s Data Security Risk Analysis [PDF]

open access: yes
Establishing the networks security risk can be a very difficult operation especially for the small companies which, from financial reasons can’t appeal at specialist in this domain, or for the medium or large companies that don’t have experience.
Emil BURTESCU
core  

The Costs of Deception: Evidence From Psychology [PDF]

open access: yes
Recently, it has been argued that the evidence in social science research suggests that deceiving subjects in an experiment does not lead to a significant loss of experimental control.
Andreas Ortmann, Ralph Hertwig
core  

Blockchain-Based Data Access Control and Key Agreement System in IoT Environment. [PDF]

open access: yesSensors (Basel), 2023
Lee J   +6 more
europepmc   +1 more source

A Secure Data-Sharing Model Resisting Keyword Guessing Attacks in Edge–Cloud Collaboration Scenarios

open access: yesElectronics
In edge–cloud collaboration scenarios, data sharing is a critical technological tool, yet smart devices encounter significant challenges in ensuring data-sharing security. Attribute-based keyword search (ABKS) is employed in these contexts to facilitate fine-grained access control over shared data, allowing only users with the necessary privileges to ...
Ye Li   +4 more
openaire   +1 more source

Comment on An Efficient Privacy-Preserving Ranked Multi-Keyword Retrieval for Multiple Data Owners in Outsourced Cloud

open access: yes
Protecting the privacy of keywords in the field of search over outsourced cloud data is a challenging task. In IEEE Transactions on Services Computing (Vol. 17 No. 2, March/April 2024), Li et al.
Varri, Uma Sankararao
core  

Public Key Encryption with Keyword Search in Cloud: A Survey. [PDF]

open access: yesEntropy (Basel), 2020
Zhou Y, Li N, Tian Y, An D, Wang L.
europepmc   +1 more source

Home - About - Disclaimer - Privacy