Results 41 to 50 of about 72,952 (289)
The paper discusses possibilities for use of message authentication signatures schemes based on error-correcting coding which may be candidates for use in post-quantum cryptography.
Aleksandr Aleksandrovich Kuznetsov +2 more
doaj
Information Theoretic Authentication and Secrecy Codes in the Splitting Model
In the splitting model, information theoretic authentication codes allow non-deterministic encoding, that is, several messages can be used to communicate a particular plaintext.
Huber, Michael
core +1 more source
Secure communication requires message authentication. In this paper we address the problem of how to authenticate quantum information sent through a quantum channel between two communicating parties with the minimum amount of resources. Specifically, our
Curty, Marcos +3 more
core +2 more sources
From omics to AI—mapping the pathogenic pathways in type 2 diabetes
Integrating multi‐omics data with AI‐based modelling (unsupervised and supervised machine learning) identify optimal patient clusters, informing AI‐driven accurate risk stratification. Digital twins simulate individual trajectories in real time, guiding precision medicine by matching patients to targeted therapies.
Siobhán O'Sullivan +2 more
wiley +1 more source
The Web SSO Standard OpenID Connect: In-Depth Formal Security Analysis and Security Guidelines
Web-based single sign-on (SSO) services such as Google Sign-In and Log In with Paypal are based on the OpenID Connect protocol. This protocol enables so-called relying parties to delegate user authentication to so-called identity providers.
Fett, Daniel +2 more
core +1 more source
Structural dynamics of the plant hormone receptor ETR1 in a native‐like membrane environment
The present study unveils the structural and signaling dynamics of ETR1, a key plant ethylene receptor. Using an optimized nanodisc system and solution NMR, we captured full‐length ETR1 in a native‐like membrane environment. Our findings reveal dynamic domain uncoupling and Cu(I)‐induced rigidification, providing the first evidence of metal‐triggered ...
Moritz Lemke +2 more
wiley +1 more source
RFC8573: Message authentication code for the network time protocol [PDF]
The Network Time Protocol (NTP), as described in RFC 5905, states that NTP packets should be authenticated by appending NTP data to a 128-bit key and hashing the result with MD5 to obtain a 128-bit tag.
Goldberg, Sharon, Malhotra, Aanchal
core
Mutations in the C9orf72 gene represent the most common genetic cause of amyotrophic lateral sclerosis (ALS), a fatal neurodegenerative disease. Using patient‐derived neurons and C. elegans models, we find that the nucleoporin Nup107 is dysregulated in C9orf72‐associated ALS. Conversely, reducing Nup107 levels mitigates disease‐related changes.
Saygın Bilican +7 more
wiley +1 more source
Analysing and attacking the 4-way handshake of IEEE 802.11i standard [PDF]
The IEEE 802.11i standard has been designed to enhance security in wireless networks. In the 4-way handshake the supplicant and the authenticator use the pairwise master key (PMK) to derive a fresh pairwise transient key (PTK).
Alabdulatif, A, Ma, X, Nolle, L
core +1 more source
Cancer cell death induced by the NAD antimetabolite Vacor discloses the antitumor potential of SARM1
Vacor, a compound converted into the toxic metabolite Vacor adenine dinucleotide (VAD) by the nicotinamide salvage pathway enzymes NAMPT and NMNAT2, exhibits antitumor activity by inducing rapid and complete NAD depletion. We report that Vacor toxicity is limited to cell lines expressing high levels of SARM1, a NAD glycohydrolase.
Giuseppe Ranieri +5 more
wiley +1 more source

