Results 101 to 110 of about 535,713 (347)
CP-ABE Scheme Supports Fully Policy and Attribute Hidden [PDF]
The existing ciphertext-policy attribute-based encryption schemes that support policy or attribute hiding can achieve fine-grained access control for privacy protection,but most of them only realize partial policy hiding of attribute values,and ignore ...
JIANG Luhan, TIAN Youliang, XIANG Axin
doaj +1 more source
Development of Public Key Cryptographic Algorithm Using Matrix Pattern for Tele-Ultrasound Applications [PDF]
Seung-Hyeok Shin +2 more
openalex +1 more source
CRISPRI‐mediated gene silencing and phenotypic exploration in nontuberculous mycobacteria. In this Research Protocol, we describe approaches to control, monitor, and quantitatively assess CRISPRI‐mediated gene silencing in M. smegmatis and M. abscessus model organisms.
Vanessa Point +7 more
wiley +1 more source
RSA: Dagli anni '70 al giorno d'oggi
In this note, after a brief historical excursus, we describe the revolution in cryptography of the 70es, due to the introduction of public key cryptography and the RSA algorithm. We also consider some contemporary applications of this algorithm.
Pellegrini, S
doaj +1 more source
Chemoresistance in bladder cancer: Macrophage recruitment associated with CXCL1, CXCL5 and CXCL8 expression is characteristic of Gemcitabine/Cisplatin (Gem/Cis) Non‐Responder tumors (right side) while Responder tumors did not show substantial tumor‐stromal crosstalk (left side). All biological icons are attributed to Bioicons: carcinoma, cancerous‐cell‐
Sophie Leypold +11 more
wiley +1 more source
A new public key cryptography using generalized Fibonacci matrices [PDF]
This work presents a new public key cryptography encryption-decryption scheme based on generalized Fibonacci matrices and the Hill cipher. This scheme proposes using Fibonacci sequences under prime modulo for key establishment.
Jyoti Panchal +2 more
doaj
Impossibility of Three Pass Protocol using Public Abelian Groups
Key transport protocols are designed to transfer a secret key from an initiating principal to other entities in a network. The three-pass protocol is a key transport protocol developed by Adi Shamir in 1980 where Alice wants to transport a secret message
Kılıç, Adnan +2 more
core
ZFAS1 is a lncRNA promoting cell proliferation and migration, exhibiting high expression in various cancers. It is conserved, widely expressed, and produces multiple splice variants with unclear roles. We identified several splice variants in hepatocyte models, and found that inhibiting or suppressing regulators of the unfolded protein response (PERK ...
Sébastien Soubeyrand +2 more
wiley +1 more source
High-Performance NTRU Accelerator Using a Direct Memory Access Controller
NTRU is a well-established and widely used public-key cryptography. It has been standardized in IEEE Std1363.1 and X9.98, and its variant was submitted to the National Institute of Standards and Technology (NIST) post-quantum cryptography (PQC ...
Seon Bhin Kim +2 more
doaj +1 more source
Meta‐analysis fails to show any correlation between protein abundance and ubiquitination changes
We analyzed over 50 published proteomics datasets to explore the relationship between protein levels and ubiquitination changes across multiple experimental conditions and biological systems. Although ubiquitination is often associated with protein degradation, our analysis shows that changes in ubiquitination do not globally correlate with changes in ...
Nerea Osinalde +3 more
wiley +1 more source

