Results 61 to 70 of about 4,501,528 (307)

Staging quantum cryptography with chocolate balls

open access: yes, 2005
Moderated by a director, laymen and students are encouraged to assume the role of quanta and enact a quantum cryptographic protocol. The performance is based on a generalized urn model capable of reproducing complementarity even for classical chocolate ...
Svozil, Karl
core   +1 more source

The newfound relationship between extrachromosomal DNAs and excised signal circles

open access: yesFEBS Letters, EarlyView.
Extrachromosomal DNAs (ecDNAs) contribute to the progression of many human cancers. In addition, circular DNA by‐products of V(D)J recombination, excised signal circles (ESCs), have roles in cancer progression but have largely been overlooked. In this Review, we explore the roles of ecDNAs and ESCs in cancer development, and highlight why these ...
Dylan Casey, Zeqian Gao, Joan Boyes
wiley   +1 more source

Fuzzy Authentication using Rank Distance

open access: yes, 2017
Fuzzy authentication allows authentication based on the fuzzy matching of two objects, for example based on the similarity of two strings in the Hamming metric, or on the similiarity of two sets in the set difference metric.
A Cossidente   +8 more
core   +1 more source

Emerging role of ARHGAP29 in melanoma cell phenotype switching

open access: yesMolecular Oncology, EarlyView.
This study gives first insights into the role of ARHGAP29 in malignant melanoma. ARHGAP29 was revealed to be connected to tumor cell plasticity, promoting a mesenchymal‐like, invasive phenotype and driving tumor progression. Further, it modulates cell spreading by influencing RhoA/ROCK signaling and affects SMAD2 activity. Rho GTPase‐activating protein
Beatrice Charlotte Tröster   +3 more
wiley   +1 more source

Patient‐specific pharmacogenomics demonstrates xCT as predictive therapeutic target in colon cancer with possible implications in tumor connectivity

open access: yesMolecular Oncology, EarlyView.
This study integrates transcriptomic profiling of matched tumor and healthy tissues from 32 colorectal cancer patients with functional validation in patient‐derived organoids, revealing dysregulated metabolic programs driven by overexpressed xCT (SLC7A11) and SLC3A2, identifying an oncogenic cystine/glutamate transporter signature linked to ...
Marco Strecker   +16 more
wiley   +1 more source

New Threats and Innovative Protection Methods in Wireless Transmission Systems

open access: yesJournal of Telecommunications and Information Technology, 2014
Many improvements in the field of wireless communication can be observed nowadays. Some developments are gradual, others are revolutionary. It is obvious that each innovation in the area may lead to new security threats and vulnerabilities.
Tomasz Bilski
doaj   +1 more source

Smart Crop Growth Monitoring Based on System Adaptivity and Edge AI

open access: yesIEEE Access, 2022
This work proposes a smart crop growth monitoring system that contains an adaptive cryptography engine to ensure the security of sensor data and an edge artificial intelligence (AI) based estimator to classify the pest and disease severity (PDS) of ...
Chun-Hsian Huang   +3 more
doaj   +1 more source

Comments on "Physical-layer cryptography through massive MIMO"

open access: yes, 2020
We present two attacks on two different versions of physical layer cryptography schemes based on massive multiple-input multiple-output (MIMO). Both cryptosystems employ a singular value decomposition (SVD) precoding technique. For the first one, we show that the eavesdropper (who knows its own channel and the channel between legitimate users) can ...
Sakzad, Amin, Steinfeld, Ron
openaire   +2 more sources

Novel Intrinsic Physical Unclonable Function Design for Post-quantum Cryptography

open access: yes2023 IEEE International Symposium on Circuits and Systems (ISCAS), 2023
The hardware implementations of post-quantum cryptography (PQC) algorithms are vulnerable to fault injection attacks. As a hardware security primitive, the intrinsic physical unclonable function (PUF) is a possible countermeasure for these attacks with low resource overheads.
Wang, Baosheng   +4 more
openaire   +2 more sources

From quantum-codemaking to quantum code-breaking [PDF]

open access: yes, 1997
This is a semi-popular overview of quantum entanglement as an important physical resource in the field of data security and quantum computing. After a brief outline of entanglement's key role in philosophical debates about the meaning of quantum ...
Ekert, Artur
core   +1 more source

Home - About - Disclaimer - Privacy