Results 71 to 80 of about 16,729,036 (330)

Public-key Infrastructure

open access: yesAmerican International Journal of Sciences and Engineering Research, 2018
This paper presents the profiles related to public-key Infrastructure (PKI) for the Internet. The PKI manages public keys automatically through the use of public-key certificates. It provides a basis for accommodating interoperation between PKI entities. A
Md. Rezaul Karim Miajee
semanticscholar   +1 more source

Reciprocal control of viral infection and phosphoinositide dynamics

open access: yesFEBS Letters, EarlyView.
Phosphoinositides, although scarce, regulate key cellular processes, including membrane dynamics and signaling. Viruses exploit these lipids to support their entry, replication, assembly, and egress. The central role of phosphoinositides in infection highlights phosphoinositide metabolism as a promising antiviral target.
Marie Déborah Bancilhon, Bruno Mesmin
wiley   +1 more source

Internet X.509 Public Key Infrastructure Operational Protocols -- LDAPv3 [PDF]

open access: yes, 2002
This document describes the features of the Lightweight Directory Access Protocol v3 that are needed in order to support a public key infrastructure based on X.509 certificates and ...
Chadwick, David W.
core  

An intracellular transporter mitigates the CO2‐induced decline in iron content in Arabidopsis shoots

open access: yesFEBS Letters, EarlyView.
This study identifies a gene encoding a transmembrane protein, MIC, which contributes to the reduction of shoot Fe content observed in plants under elevated CO2. MIC is a putative Fe transporter localized to the Golgi and endosomal compartments. Its post‐translational regulation in roots may represent a potential target for improving plant nutrition ...
Timothy Mozzanino   +7 more
wiley   +1 more source

Triple receiver public key encryption cryptosystem

open access: yes网络与信息安全学报, 2020
A triple receiver public key cryptosystem was proposed.In the cryptosystem,a sender encrypted a message and sent to three receivers,while the three receivers were able to decrypt the message with their own private keys.Based on bilinear map,two triple ...
Liutao ZHAO   +4 more
doaj   +3 more sources

Hematopoietic (stem) cells—The elixir of life?

open access: yesFEBS Letters, EarlyView.
The aging of HSCs (hematopoietic stem cells) and the blood system leads to the decline of other organs. Rejuvenating aged HSCs improves the function of the blood system, slowing the aging of the heart, kidney, brain, and liver, and the occurrence of age‐related diseases.
Emilie L. Cerezo   +4 more
wiley   +1 more source

Secret Key Agreement from Correlated Gaussian Sources by Rate Limited Public Communication

open access: yes, 2010
We investigate the secret key agreement from correlated Gaussian sources in which the legitimate parties can use the public communication with limited rate.
Oohama, Yasutada, Watanabe, Shun
core   +2 more sources

Multiple ETS family transcription factors bind mutant p53 via distinct interaction regions

open access: yesFEBS Letters, EarlyView.
Mutant p53 gain‐of‐function is thought to be mediated by interaction with other transcription factors. We identify multiple ETS transcription factors that can bind mutant p53 and found that this interaction can be promoted by a PXXPP motif. ETS proteins that strongly bound mutant p53 were upregulated in ovarian cancer compared to ETS proteins that ...
Stephanie A. Metcalf   +6 more
wiley   +1 more source

Advanced Homomorphic Encryption for Cloud Data Security

open access: yesJOIV: International Journal on Informatics Visualization, 2017
This paper aims to provide security of data in the Cloud using Multiplicative Homomorphic Approach. Encryption process is done with RSA algorithm. In this RSA algorithm, Shor’s algorithm is used for generating Public key Component, which enhances the ...
D. Chandravathi, P.V. Lakshmi
doaj   +1 more source

Quantum Resistant Random Linear Code Based Public Key Encryption Scheme RLCE [PDF]

open access: yes, 2015
Lattice based encryption schemes and linear code based encryption schemes have received extensive attention in recent years since they have been considered as post-quantum candidate encryption schemes.
Wang, Yongge
core   +2 more sources

Home - About - Disclaimer - Privacy