Results 51 to 60 of about 10,264,102 (368)

Architecture and key technologies of 5G power private network

open access: yesDianxin kexue, 2022
Some main aspects of 5G power private network including network architecture, key technologies and the analysis on the existing key issues aiming to large-scale commercial use were intorduced.Firstly, the service characteristics of power grid was combed ...
Rong WANG   +4 more
doaj   +2 more sources

Mapping the evolution of mitochondrial complex I through structural variation

open access: yesFEBS Letters, EarlyView.
Respiratory complex I (CI) is crucial for bioenergetic metabolism in many prokaryotes and eukaryotes. It is composed of a conserved set of core subunits and additional accessory subunits that vary depending on the organism. Here, we categorize CI subunits from available structures to map the evolution of CI across eukaryotes. Respiratory complex I (CI)
Dong‐Woo Shin   +2 more
wiley   +1 more source

Efficient Quantum Private Comparison without Sharing a Key

open access: yesEntropy, 2023
Quantum private comparison (QPC) allows at least two users to compare the equality of their secret information, for which the security is based on the properties of quantum mechanics.
Jian Li, Fanting Che, Zhuo Wang, Anqi Fu
doaj   +1 more source

Key exchange protocol based on the private key [PDF]

open access: yesAdvances in Intelligent Systems Research, 2015
At present, most existing key exchange protocols for three-party (3pake) are easily attacked by server key disclosure, dictionary attack and so on. This paper analyses the weakness of the previous work , and presents a key exchange for three-party based on the private key .This method can resist common attack through safety analysis, and the efficiency
Wenqian Shang, Minyong Shi, Tong Yi
openaire   +1 more source

Biased RSA Private Keys: Origin Attribution of GCD-Factorable Keys [PDF]

open access: yes, 2020
In 2016, Svenda et al. (USENIX 2016, The Million-key Question) reported that the implementation choices in cryptographic libraries allow for qualified guessing about the origin of public RSA keys. We extend the technique to two new scenarios when not only public but also private keys are available for the origin attribution - analysis of a source of ...
Janovsky, Adam   +4 more
openaire   +3 more sources

Bridging the gap: Multi‐stakeholder perspectives of molecular diagnostics in oncology

open access: yesMolecular Oncology, EarlyView.
Although molecular diagnostics is transforming cancer care, implementing novel technologies remains challenging. This study identifies unmet needs and technology requirements through a two‐step stakeholder involvement. Liquid biopsies for monitoring applications and predictive biomarker testing emerge as key unmet needs. Technology requirements vary by
Jorine Arnouts   +8 more
wiley   +1 more source

New sequences from the generalized Pell p−numbers and mersenne numbers and their application in cryptography

open access: yesAIMS Mathematics
This paper presents the generalized Pell $ p- $numbers and provides some related results. A new sequence is defined using the characteristic polynomial of the Pell $ p- $numbers and generalized Mersenne numbers.
Elahe Mehraban   +4 more
doaj   +1 more source

In vitro models of cancer‐associated fibroblast heterogeneity uncover subtype‐specific effects of CRISPR perturbations

open access: yesMolecular Oncology, EarlyView.
Development of therapies targeting cancer‐associated fibroblasts (CAFs) necessitates preclinical model systems that faithfully represent CAF–tumor biology. We established an in vitro coculture system of patient‐derived pancreatic CAFs and tumor cell lines and demonstrated its recapitulation of primary CAF–tumor biology with single‐cell transcriptomics ...
Elysia Saputra   +10 more
wiley   +1 more source

Design and parallel implementation on Artix-7 FPGA of the SIMON32/64 Cryptosystem

open access: yesVisión Electrónica, 2022
In the rise of digital transformation, information security is positioned in a prominent place because it provides confidence to society in the use of information technologies. For this reason, there is growing research in this area.
José Gabriel Rincón-González   +2 more
doaj  

Developing Public-Private Key Pairs Using Highly-Available Technology [PDF]

open access: yes, 2018
The investigation of IPv4 has investigated simulated annealing, and current trends suggest that the emulation of congestion control will soon emerge. In this paper, authors show the development of randomized algorithms.
Colson, O. (Orville)   +3 more
core  

Home - About - Disclaimer - Privacy