Results 261 to 270 of about 24,566 (328)
Challenges and opportunities on the horizon of post-quantum cryptography [PDF]
Bharat S. Rawal, Peter Curry
openalex +1 more source
Tandem protein trans‐splicing (PTS) assembles a protein from three segments. Expanding this technology to individually treat cysteines in each segment, for example, for chemical labeling using thiol bioconjugation, the authors identify a second, highly efficient cysteine‐less split intein.
Christoph Humberg +3 more
wiley +2 more sources
Linkable Ring Signature for Privacy Protection in Blockchain-Enabled IIoT. [PDF]
Guo F +5 more
europepmc +1 more source
Self‐assembled thiol‐rich polypseudorotaxanes with high modularity were developed via a “one‐pot” preparation through the threading of thiolated α‐cyclodextrins on polymers and subsequent oxidation of thiols into disulfide bonds. This dynamic motif was used as a functionalization platform for thiophilic metal nanoparticles, either tethering them to a ...
Xiang Xu +12 more
wiley +1 more source
Cybersecurity in the financial sector and the quantum-safe cryptography transition: in search of a precautionary approach in the EU Digital Operational Resilience Act framework. [PDF]
Jančiūtė L.
europepmc +1 more source
Preserving Privacy of Internet of Things Network with Certificateless Ring Signature. [PDF]
Zhang Y, Duan P, Li C, Zhang H, Ahmad H.
europepmc +1 more source
Wireless and Fiber-Based Post-Quantum-Cryptography-Secured IPsec Tunnel
Daniel Christian Lawo +6 more
openalex +1 more source
A Lightweight Certificateless Authenticated Key Agreement Scheme Based on Chebyshev Polynomials for the Internet of Drones. [PDF]
Li Z, Ju Z, Zhao H, Wei Z, Lan G.
europepmc +1 more source
This study advances top‐down individual ion mass spectrometry (I2MS) to profile intact phospho‐proteoforms of β‐ and α‐catenins (85–110 kDa) within cadherin–catenin complexes. By modulating actomyosin contractility, we reveal mechano‐sensitive phosphorylation patterns and propose that distinct catenin proteoforms may reflect adhesive states at cell ...
Che‐Fan Huang +4 more
wiley +1 more source
Cryptographic key generation using deep learning with biometric face and finger vein data. [PDF]
Gizachew Yirga T +2 more
europepmc +1 more source

