Results 31 to 40 of about 5,059,786 (358)
Anonymous multi-party quantum computation with a third party [PDF]
We reconsider and modify the second secure multi-party quantum addition protocol proposed in our original work. We show that the protocol is an anonymous multi-party quantum addition protocol rather than a secure multi-party quantum addition protocol.
arxiv
Subcellular Fractionation Using Accudenz Gradient to Separate ER/Golgi in Yeast
This protocol describes how to separate the endoplasmic reticulum (ER) and Golgi apparatus in yeast cells using a subcellular fractionation approach with an Accudenz gradient.
Bio-protocol Editorial Office
doaj +1 more source
The Constrained Application Protocol (CoAP)
The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks.
Z. Shelby, K. Hartke, C. Bormann
semanticscholar +1 more source
An improved ATAC-seq protocol reduces background and enables interrogation of frozen tissues
We present Omni-ATAC, an improved ATAC-seq protocol for chromatin accessibility profiling that works across multiple applications with substantial improvement of signal-to-background ratio and information content.
M. Corces+21 more
semanticscholar +1 more source
Exercise-induced Laryngeal Obstruction: Protocol for a Randomized Controlled Treatment Trial
BackgroundExercise-induced laryngeal obstruction (EILO) is a common cause of exertional breathing problems in young individuals, caused by paradoxical inspiratory adduction of laryngeal structures, and diagnosed by continuous visualization of the larynx ...
Hege Clemm+30 more
doaj +1 more source
Efficient protocols for unidirectional and bidirectional controlled deterministic secure quantum communication: Different alternative approaches [PDF]
Recently, Hassanpour and Houshmand have proposed a protocol of controlled deterministic secure quantum communication (Quant. Info. Process, DOI 10.1007/s11128-014-0866-z (2014)). The authors compared the efficiency of their protocol with that of two other existing protocols and claimed that their protocol is efficient.
arxiv +1 more source
Multi-access Edge Computing (MEC) has emerged as a novel and efficient technology to enable a new breed of time sensitive applications in the 5G era. By installing small computing infrastructures at the network edges, it solves the current centralized ...
Khasa Gillani, Jong-Hyouk Lee
doaj
Survey of network-layer anonymous communication protocols
An anonymous communication system is an overlay network built on the application layer and combining various privacy protection technologies such as data forwarding, content encryption, and traffic obfuscation to hide communication relationships between ...
WANG Liangmin, NI Xiaoling, ZHAO Hui
doaj +1 more source
The Transport Layer Security (TLS) Protocol Version 1.3
This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet.
E. Rescorla
semanticscholar +1 more source
Cognitive radio (CR) enables unlicensed users to explore and exploit underutilized licensed channels (or white spaces). While multi-hop CR network has drawn significant research interest in recent years, majority work has been validated through ...
Aqeel Raza Syed+5 more
doaj +1 more source