Results 51 to 60 of about 283,565 (299)
Balancing climate change mitigation and environmental protection interests in the EU Directive on carbon capture and storage [PDF]
The EU Climate and Energy Package highlights the potential contradictions between the climate change imperative of reducing GHGs emissions and the importance to maintain environmental integrity. While the package supports climate change mainstreaming, it
Montini, Massimiliano, Orlando, Emanuela
core +1 more source
This paper reveals how human lactoferrin–albumin fusion (hLF‐HSA) potently suppresses lung adenocarcinoma cell migration. hLF‐HSA upregulates NHE7, leading to Golgi alkalization, disruption of the Golgi secretome, downregulation of MMP1, and reversal of EMT. These findings suggest a novel Golgi‐targeting strategy to suppress cancer cell migration.
Hana Nopia +3 more
wiley +1 more source
The paper proposed a design scheme of selective leakage protection circuit based on method of amplitude discrimination and phase discrimination for electrical control equipments of fully mechanized devices of coal mine underground.The selective leakage ...
FAN Yi-long~, LI Hang~, YOU Guo-dong~
doaj
Protecting subspaces by acting on the outside
Many quantum control tasks aim at manipulating the state of a quantum mechanical system within a finite subspace of states. However, couplings to the outside are often inevitable.
Almut Beige +11 more
core +1 more source
Non-malleable codes for space-bounded tampering [PDF]
Non-malleable codes—introduced by Dziembowski, Pietrzak and Wichs at ICS 2010—are key-less coding schemes in which mauling attempts to an encoding of a given message, w.r.t.
A Faonio +30 more
core +2 more sources
Functional and Structural Evidence of Neurofluid Circuit Aberrations in Huntington Disease
ABSTRACT Objective Disrupted neurofluid regulation may contribute to neurodegeneration in Huntington disease (HD). Because neurofluid pathways influence waste clearance, inflammation, and the distribution of central nervous system (CNS)–delivered therapeutics, understanding their dysfunction is increasingly important as targeted treatments emerge.
Kilian Hett +8 more
wiley +1 more source
On the Duality of Probing and Fault Attacks [PDF]
In this work we investigate the problem of simultaneous privacy and integrity protection in cryptographic circuits. We consider a white-box scenario with a powerful, yet limited attacker.
Gammel, Berndt M., Mangard, Stefan
core +2 more sources
Rethinking Split Manufacturing: An Information-Theoretic Approach with Secure Layout Techniques
Split manufacturing is a promising technique to defend against fab-based malicious activities such as IP piracy, overbuilding, and insertion of hardware Trojans. However, a network flow-based proximity attack, proposed by Wang et al.
Ashraf, Mohammed +5 more
core +1 more source
Relations among Security Metrics for Template Protection Algorithms [PDF]
Many biometric template protection algorithms have been proposed mainly in two approaches: biometric feature transformation and biometric cryptosystem.
Inuma, Manabu, Otsuka, Akira
core +1 more source
High‐temperature interactions between low‐sulfur Al‐killed Mn–B steel and MgO–C refractories (0 and 50 wt% recyclates) are studied via finger immersion tests (1600 °C). Surface‐active elements influence infiltration. MgO/CaS layer forms, along with spinel and calcium silicate.
Matheus Roberto Bellé +5 more
wiley +1 more source

