Results 71 to 80 of about 19,760 (270)

Engineering Compact Base Editors by AlphaFold‐Guided Mutation Scan and Escherichia coli‐Based Tri‐Selection

open access: yesAdvanced Science, EarlyView.
A miniaturized deaminase SsdAtox was scanned with AlphaFold to identify DNA binding pocket hot spots. Site‐saturation mutagenesis at gatekeeper residue K31 yielded ten‐fold activity enhancement. Trinity Screen, an E. coli‐based three‐in‐one platform selecting for high activity and reduced double‐strand breaks, enabled combinatorial evolution at DNA ...
Ryeo Gang Son   +2 more
wiley   +1 more source

Chosen-ciphertext secure proxy re-encryption [PDF]

open access: yesProceedings of the 14th ACM conference on Computer and communications security, 2007
In a proxy re-encryption (PRE) scheme, a proxy is given special information that allows it to translate a ciphertext under one key into a ciphertext of the same message under a different key. The proxy cannot, however, learn anything about the messages encrypted under either key.
Ran Canetti, Susan Hohenberger
openaire   +1 more source

Decrypting SSL/TLS traffic for hidden threats detection

open access: yes, 2019
The paper presents an analysis of the main mechanisms of decryption of SSL/TLS traffic. Methods and technologies for detecting malicious activity in encrypted traffic that are used by leading companies are also considered.
Ageyev, Dmytro   +4 more
core   +1 more source

Tobacco Smoke Exposure From Prenatal To Adolescent Periods Drives IBD Pathogenesis: Dynamic DNA Methylation Signatures Across Lifespan Stages

open access: yesAdvanced Science, EarlyView.
This study illustrates that maternal smoking during pregnancy (MSDP) is an independent risk factor for IBD in offspring, and DNA methylation serves as a key mechanistic pathway connecting early‐life smoking exposure with IBD risk in offspring. That highlights the urgent need for preventive interventions targeting prospective parents and minors to ...
Han Zhang   +11 more
wiley   +1 more source

Efficient provable dual receiver hybrid and light weight public key schemes based on the discrete logarithm problem without pairings

open access: yesIET Communications
Dual‐receiver proxy re‐encryption is a cryptographic technique that enables secure data sharing among multiple authorized users or entities. It has gained significant attention for its ability to manage access permissions, data confidentiality, and ...
Eman Abouelkheir
doaj   +1 more source

A Lightweight and Formally Secure Certificate Based Signcryption With Proxy Re-Encryption (CBSRE) for Internet of Things Enabled Smart Grid

open access: yesIEEE Access, 2020
A smart grid is a new ecosystem, which is made by combining a number of smart Internet of Things (IoT) devices that manage wide energy sources by increasing the efficiency and reliability of the smart energy systems.
Saddam Hussain   +7 more
doaj   +1 more source

Conversion of Transplanted Mature Hepatocytes into Afp+ Reprogrammed Cells for Liver Regeneration After Injury

open access: yesAdvanced Science, EarlyView.
Donor‐derived tdTomato+ mature hepatocytes were FACS‐isolated and transplanted into Fah−/− host mice. During regeneration, these cells convert into proliferative, unipotent Afp+ rHeps. Their plasticity is governed by a PPARγ/AFP‐dependent metabolic switch, segregating into pro‐proliferative Afplow and pro‐survival Afphigh subpopulations.
Ting Fang   +12 more
wiley   +1 more source

Delegation of Decryption Rights With Revocability From Learning With Errors

open access: yesIEEE Access, 2018
The notion of decryption rights delegation was initially introduced by Blaze et al. in EUROCRYPT 1998. It, defined as proxy re-encryption, allows a semi-trusted proxy to convert a ciphertext intended for a party to another ciphertext of the same ...
Wei Yin   +6 more
doaj   +1 more source

The Secure Link Prediction Problem [PDF]

open access: yes, 2019
Link Prediction is an important and well-studied problem for social networks. Given a snapshot of a graph, the link prediction problem predicts which new interactions between members are most likely to occur in the near future.
Ruj, Sushmita, Sardar, Laltu
core   +1 more source

Discovery of an Adaptive Neuroimmune Response Driving Itch and Fast Tick Removal with Implications for Preventing Pathogen Transmission

open access: yesAdvanced Science, EarlyView.
Doehl et al. discovered an adaptive neuroimmune mechanism that induces itch in tick‐exposed guinea pigs, enabling rapid tick removal. This itch‐induced tick removal (IITR) is mediated by an adaptive cellular immune response and is independent of IgG, IgE, or TRPV1.
Johannes S. P. Doehl   +27 more
wiley   +1 more source

Home - About - Disclaimer - Privacy