Results 71 to 80 of about 19,760 (270)
A miniaturized deaminase SsdAtox was scanned with AlphaFold to identify DNA binding pocket hot spots. Site‐saturation mutagenesis at gatekeeper residue K31 yielded ten‐fold activity enhancement. Trinity Screen, an E. coli‐based three‐in‐one platform selecting for high activity and reduced double‐strand breaks, enabled combinatorial evolution at DNA ...
Ryeo Gang Son +2 more
wiley +1 more source
Chosen-ciphertext secure proxy re-encryption [PDF]
In a proxy re-encryption (PRE) scheme, a proxy is given special information that allows it to translate a ciphertext under one key into a ciphertext of the same message under a different key. The proxy cannot, however, learn anything about the messages encrypted under either key.
Ran Canetti, Susan Hohenberger
openaire +1 more source
Decrypting SSL/TLS traffic for hidden threats detection
The paper presents an analysis of the main mechanisms of decryption of SSL/TLS traffic. Methods and technologies for detecting malicious activity in encrypted traffic that are used by leading companies are also considered.
Ageyev, Dmytro +4 more
core +1 more source
This study illustrates that maternal smoking during pregnancy (MSDP) is an independent risk factor for IBD in offspring, and DNA methylation serves as a key mechanistic pathway connecting early‐life smoking exposure with IBD risk in offspring. That highlights the urgent need for preventive interventions targeting prospective parents and minors to ...
Han Zhang +11 more
wiley +1 more source
Dual‐receiver proxy re‐encryption is a cryptographic technique that enables secure data sharing among multiple authorized users or entities. It has gained significant attention for its ability to manage access permissions, data confidentiality, and ...
Eman Abouelkheir
doaj +1 more source
A smart grid is a new ecosystem, which is made by combining a number of smart Internet of Things (IoT) devices that manage wide energy sources by increasing the efficiency and reliability of the smart energy systems.
Saddam Hussain +7 more
doaj +1 more source
Donor‐derived tdTomato+ mature hepatocytes were FACS‐isolated and transplanted into Fah−/− host mice. During regeneration, these cells convert into proliferative, unipotent Afp+ rHeps. Their plasticity is governed by a PPARγ/AFP‐dependent metabolic switch, segregating into pro‐proliferative Afplow and pro‐survival Afphigh subpopulations.
Ting Fang +12 more
wiley +1 more source
Delegation of Decryption Rights With Revocability From Learning With Errors
The notion of decryption rights delegation was initially introduced by Blaze et al. in EUROCRYPT 1998. It, defined as proxy re-encryption, allows a semi-trusted proxy to convert a ciphertext intended for a party to another ciphertext of the same ...
Wei Yin +6 more
doaj +1 more source
The Secure Link Prediction Problem [PDF]
Link Prediction is an important and well-studied problem for social networks. Given a snapshot of a graph, the link prediction problem predicts which new interactions between members are most likely to occur in the near future.
Ruj, Sushmita, Sardar, Laltu
core +1 more source
Doehl et al. discovered an adaptive neuroimmune mechanism that induces itch in tick‐exposed guinea pigs, enabling rapid tick removal. This itch‐induced tick removal (IITR) is mediated by an adaptive cellular immune response and is independent of IgG, IgE, or TRPV1.
Johannes S. P. Doehl +27 more
wiley +1 more source

