Results 31 to 40 of about 20,376 (274)

Evidence of Iron Accumulation in Cerebral Adrenoleukodystrophy: A Potential Novel Disease Mechanism

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT In this first application of Quantitative Susceptibility Mapping Source Separation to cerebral adrenoleukodystrophy, we uncovered alterations in iron and myelin within lesions and normal appearing white matter. As validation, we demonstrate abnormal iron accumulation in those same compartments within primary brain tissue.
Christina L. Nemeth   +8 more
wiley   +1 more source

ProSt: Provably Secure Homomorphic Steganography

open access: yesIEEE Access
This paper introduces Provably Secure Homomorphic Steganography (ProSt), a novel technique that combines the principles of steganography and homomorphic computation.
Shahzad Ahmad, Stefan Rass
doaj   +1 more source

RNA‐Micelles as Self‐Assembling Structures for Efficient Co‐Delivery of Synergistic siRNA and Nucleoside Analogues to Treat CRC Lung Metastasis

open access: yesAdvanced Functional Materials, EarlyView.
Two kinds of self‐assembled RNA micelles were used to co‐deliver synergistic siRNA and nucleoside analogues for the treatment of colorectal cancer lung metastases. Near‐complete elimination of lung cancer metastases was confirmed in an orthotopic lung metastasis model constructed using human colorectal cancer lung metastases patient surgical samples to
Kai Jin   +4 more
wiley   +1 more source

Universally composable secure trusted access protocol for WLAN Mesh networks

open access: yesTongxin xuebao, 2008
The current access protocols of WLAN Mesh network and trusted network could not satisfy the requirements of performance and security when the trusted access is needed in WLAN Mesh networks.Then,a provably secure trusted access protocol MN-TAP for the ...
MA Zhuo1   +3 more
doaj   +2 more sources

Security of Quantum Key Distribution with Coherent States and Homodyne Detection

open access: yes, 2003
We assess the security of a quantum key distribution protocol relying on the transmission of Gaussian-modulated coherent states and homodyne detection. This protocol is shown to be equivalent to a squeezed state protocol based on a CSS code construction,
A. Steane   +5 more
core   +1 more source

Amyloidogenic Peptide Fragments Designed From Bacterial Collagen‐like Proteins Form Hydrogel

open access: yesAdvanced Functional Materials, EarlyView.
This study identified amyloidogenic sequence motifs in bacterial collagen‐like proteins and exploited these to design peptides that self‐assemble into β‐sheet fibers and form hydrogels. One hydrogel supported healthy fibroblast growth, showing promise for biocompatible materials. Our work demonstrates that bacterial sequences can be harnessed to create
Vamika Sagar   +5 more
wiley   +1 more source

Simultaneous H2O:O2 Co‐Reactant Pulsing for Functional Property Control of Atomic Layer Deposited ZnO, TiO2, and Al2O3 Thin Films

open access: yesAdvanced Materials Interfaces, EarlyView.
Simultaneous H2O:O2 co‐pulsing in thermal ALD modulates surface hydroxylation to engineer nanovoids and properties in ZnO, TiO2, and Al2O3. The ligand‑dependent pathway promotes c‑axis‑textured ZnO, reduced‑crystallinity yet Ti4+‑preserved TiO2, and highly transparent, hydrophilic Al2O3, while lowering the refractive indices.
Ramin Ghiyasi, Maarit Karppinen
wiley   +1 more source

Clean Cut (adaptive, multimodal surgical infection prevention programme) for low‐resource settings: a prospective quality improvement study

open access: yesBJS (British Journal of Surgery), EarlyView., 2020
Clean Cut is a multimodal, adaptive, checklist‐based infection prevention programme designed to improve compliance with six critical perioperative infection prevention practices. After introducing the programme at five hospitals in Ethiopia, compliance with critical infection prevention standards significantly improved and the relative risk of ...
J. A. Forrester   +16 more
wiley   +1 more source

Provably secure authentication for the internet of vehicles

open access: yesJournal of King Saud University: Computer and Information Sciences, 2023
Rapid technological development has far-reaching implications for every aspect of life, including transportation. The emerging Intelligent Transportation System (ITS) based on the Internet of Vehicles (IoV) requires robust security measures due to the ...
E Haodudin Nurkifli, Tzonelih Hwang
doaj   +1 more source

No Superluminal Signaling Implies Unconditionally Secure Bit Commitment [PDF]

open access: yes, 2014
Bit commitment (BC) is an important cryptographic primitive for an agent to convince a mutually mistrustful party that she has already made a binding choice of 0 or 1 but only to reveal her choice at a later time. Ideally, a BC protocol should be simple,
Chau, H. F.   +2 more
core  

Home - About - Disclaimer - Privacy