Results 31 to 40 of about 5,059,786 (358)

Anonymous multi-party quantum computation with a third party [PDF]

open access: yesarXiv, 2021
We reconsider and modify the second secure multi-party quantum addition protocol proposed in our original work. We show that the protocol is an anonymous multi-party quantum addition protocol rather than a secure multi-party quantum addition protocol.
arxiv  

Subcellular Fractionation Using Accudenz Gradient to Separate ER/Golgi in Yeast

open access: yesBio-Protocol, 2012
This protocol describes how to separate the endoplasmic reticulum (ER) and Golgi apparatus in yeast cells using a subcellular fractionation approach with an Accudenz gradient.
Bio-protocol Editorial Office
doaj   +1 more source

The Constrained Application Protocol (CoAP)

open access: yesRequest for Comments, 2014
The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks.
Z. Shelby, K. Hartke, C. Bormann
semanticscholar   +1 more source

An improved ATAC-seq protocol reduces background and enables interrogation of frozen tissues

open access: yesNature Methods, 2017
We present Omni-ATAC, an improved ATAC-seq protocol for chromatin accessibility profiling that works across multiple applications with substantial improvement of signal-to-background ratio and information content.
M. Corces   +21 more
semanticscholar   +1 more source

Exercise-induced Laryngeal Obstruction: Protocol for a Randomized Controlled Treatment Trial

open access: yesFrontiers in Pediatrics, 2022
BackgroundExercise-induced laryngeal obstruction (EILO) is a common cause of exertional breathing problems in young individuals, caused by paradoxical inspiratory adduction of laryngeal structures, and diagnosed by continuous visualization of the larynx ...
Hege Clemm   +30 more
doaj   +1 more source

Efficient protocols for unidirectional and bidirectional controlled deterministic secure quantum communication: Different alternative approaches [PDF]

open access: yesQuant. Info. Process. 14 (2015) 2195-2210, 2014
Recently, Hassanpour and Houshmand have proposed a protocol of controlled deterministic secure quantum communication (Quant. Info. Process, DOI 10.1007/s11128-014-0866-z (2014)). The authors compared the efficiency of their protocol with that of two other existing protocols and claimed that their protocol is efficient.
arxiv   +1 more source

Comparison of Linux virtual machines and containers for a service migration in 5G multi-access edge computing

open access: yesICT Express, 2020
Multi-access Edge Computing (MEC) has emerged as a novel and efficient technology to enable a new breed of time sensitive applications in the 5G era. By installing small computing infrastructures at the network edges, it solves the current centralized ...
Khasa Gillani, Jong-Hyouk Lee
doaj  

Survey of network-layer anonymous communication protocols

open access: yes网络与信息安全学报, 2020
An anonymous communication system is an overlay network built on the application layer and combining various privacy protection technologies such as data forwarding, content encryption, and traffic obfuscation to hide communication relationships between ...
WANG Liangmin, NI Xiaoling, ZHAO Hui
doaj   +1 more source

The Transport Layer Security (TLS) Protocol Version 1.3

open access: yesRequest for Comments, 2008
This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet.
E. Rescorla
semanticscholar   +1 more source

Route Selection for Multi-Hop Cognitive Radio Networks Using Reinforcement Learning: An Experimental Study

open access: yesIEEE Access, 2016
Cognitive radio (CR) enables unlicensed users to explore and exploit underutilized licensed channels (or white spaces). While multi-hop CR network has drawn significant research interest in recent years, majority work has been validated through ...
Aqeel Raza Syed   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy