Results 111 to 120 of about 405,500 (194)

Hydrophobicity causes anomalous migration of cystine/glutamate antiporter SLC7A11 in SDS‐PAGE with low acrylamide concentration

open access: yesFEBS Open Bio, EarlyView.
SLC7A11 frequently migrates faster in SDS‐PAGE. The present study found that the high hydrophobicity of SLC7A11 causes its anomalous migration in SDS‐PAGE with a low concentration of acrylamide gel. Replacing isoleucine with asparagine reduced hydrophobicity and restored its normal migration at 55 kDa, revealing the role of hydrophobicity and gel ...
Nsengiyumva Emmanuel   +13 more
wiley   +1 more source

Unconditionally-secure and reusable public-key authentication [PDF]

open access: yesarXiv, 2011
We present a quantum-public-key identification protocol and show that it is secure against a computationally-unbounded adversary. This demonstrates for the first time that unconditionally-secure and reusable public-key authentication is possible in principle with (pure-state) public keys.
arxiv  

METTL3 knockout accelerates hepatocarcinogenesis via inhibiting endoplasmic reticulum stress response

open access: yesFEBS Open Bio, EarlyView.
Liver‐specific knockout of N6‐methyladenosine (m6A) methyltransferase METTL3 significantly accelerated hepatic tumor initiation under various oncogenic challenges, contrary to the previously reported oncogenic role of METTL3 in liver cancer cell lines or xenograft models. Mechanistically, METTL3 deficiency reduced m6A deposition on Manf transcripts and
Bo Cui   +15 more
wiley   +1 more source

Security Algorithms for Cloud Computing Environment [PDF]

open access: yesarXiv, 2015
In symmetric key cryptography the sender as well as the receiver possess a common key. Asymmetric key cryptography involves generation of two distinct keys which are used for encryption and decryption correspondingly. The sender converts the original message to cipher text using the public key while the receiver can decipher this using his private key.
arxiv  

Possible role of human ribonuclease dicer in the regulation of R loops

open access: yesFEBS Open Bio, EarlyView.
R loops play an important role in regulating key cellular processes such as replication, transcription, centromere stabilization, or control of telomere length. However, the unscheduled accumulation of R loops can cause many diseases, including cancer, and neurodegenerative or inflammatory disorders. Interestingly, accumulating data indicate a possible
Klaudia Wojcik   +2 more
wiley   +1 more source

A new public key cryptography using generalized Fibonacci matrices [PDF]

open access: yesSurveys in Mathematics and its Applications
This work presents a new public key cryptography encryption-decryption scheme based on generalized Fibonacci matrices and the Hill cipher. This scheme proposes using Fibonacci sequences under prime modulo for key establishment.
Jyoti Panchal   +2 more
doaj  

Group ring cryptography: Cryptography, key exchange, public key [PDF]

open access: yesIntl. J. of Pure and Appl. Math., 93, no. 6, 897-927, 2014, 2013
General cryptographic schemes are presented where keys can be one-time or ephemeral. Processes for key exchange are derived. Public key cryptographic schemes based on the new systems are easily established. Authentication and signature schemes are implemented.
arxiv  

Review of Lattice-based Public key Cryptography(Russian) [PDF]

open access: yesarXiv, 2010
This article presets a review of the achievements rapidly developing field of cryptography - public-key cryptography based on the lattice theory. Paper contains the necessary basic concepts and the major problems of the lattice theory, as well as together with the description on the benefits of this cryptography class - the properties of the ...
arxiv  

The implications of the American Board of Radiology's decision to relinquish its specialty board designation on prospective authorized medical physicists (AMPs) and radiation safety officers (RSOs)

open access: yesJournal of Applied Clinical Medical Physics, EarlyView.
Abstract In order to independently supervise the medical use of byproduct material, physicists in the United States (US) must legally meet the qualifications defined by the Nuclear Regulatory Commission (NRC) in the 35th part of the tenth title of the Code of Federal Regulations (§ 10 CFR Part 35). The American Board of Radiology (ABR) relinquished its
Christopher J. Tien   +6 more
wiley   +1 more source

Electronic Voting Protocol Using Identity-Based Cryptography

open access: yesThe Scientific World Journal, 2015
Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC), which offers high flexibility through key agreement protocols and authentication mechanisms.
Gina Gallegos-Garcia   +1 more
doaj   +1 more source

Home - About - Disclaimer - Privacy