Results 251 to 260 of about 84,134 (310)
Linearity Measures for Multivariate Public Key Cryptography
Simona Samardjiska, Danilo Gligoroski
openalex +1 more source
Morphine activates the excitatory cingulate cortex–intermediate rostrocaudal division of zona incerta (Cg‐ZIm) pathway to drive hyperlocomotion in mice. Inhibiting the Cg‐ZIm pathway attenuates both acute and chronic morphine‐induced hyperlocomotion, while its activation mimics morphine's motor effects.
Chun‐Yue Li +13 more
wiley +1 more source
Conic curve encryption and digital signature based on complex number theory for cybersecurity applications. [PDF]
Kamal A +3 more
europepmc +1 more source
This study successfully establishes adamantinomatous craniopharyngioma (ACP) patient‐derived organoids (PDOs) that preserve the histopathological and genetic features of the original tumors. Through drug sensitivity assays and subsequent mechanistic analyses, the study demonstrates that Ceritinib exerts its inhibitory effects on ACP PDO growth by ...
Huarong Zhang +15 more
wiley +1 more source
Security Authentication Scheme for Vehicle-to-Everything Computing Task Offloading Environments. [PDF]
Liu Y, Li C, Sun Q, Jiang H.
europepmc +1 more source
Secure and Efficient Lattice-Based Ring Signcryption Scheme for BCCL. [PDF]
Zhang Y, Duan P, Li C, Ahmad H, Zhang H.
europepmc +1 more source
Public-key cryptography with mutual authentication for IoT platform
Jori Winderickx
openalex +1 more source
Exploring the intersection of natural sciences and information technology via entropy and randomness. [PDF]
Luescher AM, Heckel R, Grass RN.
europepmc +1 more source
Quantum-resilient and adaptive multi-region data aggregation for IoMT using zero-knowledge proofs and edge intelligence. [PDF]
Othman SB, Kumar G.
europepmc +1 more source

