Results 111 to 120 of about 3,285,429 (341)
Efficient Identity-Based and Authenticated Key Agreement Protocol [PDF]
Several identity based and implicitly authenticated key agreement protocols have been proposed in recent years and none of them has achieved all required security properties. In this paper, we propose an efficient identity-based and authenticated key agreement protocol IDAK using Weil/Tate pairing.
arxiv
The number of circulating tumor cells obtained from prostate cancer patients was increased approximately 5‐fold compared to regular CellSearch when processing 2 mL diagnostic leukapheresis material aliquots and increased by 44‐fold when processing 20 mL DLA aliquots using the flow enrichment target capture Halbach‐array.
Michiel Stevens+8 more
wiley +1 more source
Three Key Elements of Post-2012 International Climate Policy Architecture [PDF]
We describe three essential elements of an effective post-2012 international global climate policy architecture: a means to ensure that key industrialized and developing nations are involved in differentiated but meaningful ways; an emphasis on an ...
Robert N. Stavins, Sheila M. Olmstead
core +3 more sources
Automated Verification of Quantum Protocols by Equivalence Checking [PDF]
In this paper we introduce a technique and a tool for formal verification of various quantum information processing protocols. The tool uses stabilizer formalism and is capable of representing concurrent quantum protocol, thus is more expressive than quantum circuits. We also report on experimental results of using our Quantum Equivalence Checker (QEC)
arxiv
Subpar reporting of pre‐analytical variables in RNA‐focused blood plasma studies
Pre‐analytical variables strongly influence the analysis of extracellular RNA (cell‐free RNA; exRNA) derived from blood plasma. Their reporting is essential to allow interpretation and replication of results. By evaluating 200 exRNA studies, we pinpoint a lack of reporting pre‐analytical variables associated with blood collection, plasma preparation ...
Céleste Van Der Schueren+16 more
wiley +1 more source
Socio-technical transition pathways and social networks: a toolkit for empirical innovation studies [PDF]
In this note we investigate socio-technical transition pathways concentrating our attention on innovation niches formations. Specifically, we present a methodological conceptualization of innovation-niches and propose a preliminary protocol, based on a ...
Antonio Lopolito, Piergiuseppe Morone
core
Adaptation of TURN protocol to SIP protocol [PDF]
Today, SIP is a protocol par Excellence in the field of communication over Internet. But, the fact that it belongs to the application layer constitutes a weakness vis-a-vis the NAT traversal. This weakness is due to the way in which the server replies to the requests of clients on the one hand.
arxiv
Cancer‐associated fibroblasts (CAFs) promote cancer growth, invasion (metastasis), and drug resistance. Here, we identified functional and diverse circulating CAFs (cCAFs) in patients with metastatic prostate cancer (mPCa). cCAFs were found in higher numbers and were functional and diverse in mPCa patients versus healthy individuals, suggesting their ...
Richell Booijink+6 more
wiley +1 more source
Biological hazards that can affect the health of the workers that handle hospital waste
Technological advances allow the science development, with the creation of new materials / equipment and the offer of different products and services. Some of these materials, after use, are discarded, becoming waste.
Trajano Felipe Barrabas Xavier da Silva+3 more
doaj +1 more source
Simple and Efficient Contract Signing Protocol [PDF]
In this paper, a new contract signing protocol is proposed based on the RSA signature scheme. The protocol will allow two parties to sign the same contract and then exchange their digital signatures. The protocol ensures fairness in that it offers parties greater security: either both parties receive each other's signatures or neither does.
arxiv