Results 81 to 90 of about 507,576 (358)

Quantum Key Distribution for V2I communications with software‐defined networking

open access: yesIET Quantum Communication
The evolution of Connected and Autonomous Vehicles (CAVs) promises improvements in our travel experience and the potential to enhance road safety and reduce environmental impact.
Alexandros Stavdas   +9 more
doaj   +1 more source

Survey on SAP and its application in public-key cryptography

open access: yesJournal of Mathematical Cryptology, 2020
The concept of the semigroup action problem (SAP) was first introduced by Monico in 2002. Monico explained in his paper that the discrete logarithm problem (DLP) can be generalized to SAP. After defining the action problem in a semigroup, the concept was
Goel Neha, Gupta Indivar, Dass B. K.
doaj   +1 more source

Predictors of response and rational combinations for the novel MCL‐1 inhibitor MIK665 in acute myeloid leukemia

open access: yesMolecular Oncology, EarlyView.
This study characterizes the responses of primary acute myeloid leukemia (AML) patient samples to the MCL‐1 inhibitor MIK665. The results revealed that monocytic differentiation is associated with MIK665 sensitivity. Conversely, elevated ABCB1 expression is a potential biomarker of resistance to the treatment, which can be overcome by the combination ...
Joseph Saad   +17 more
wiley   +1 more source

Current trends in single‐cell RNA sequencing applications in diabetes mellitus

open access: yesFEBS Open Bio, EarlyView.
Single‐cell RNA sequencing is a powerful approach to decipher the cellular and molecular landscape at a single‐cell resolution. The rapid development of this technology has led to a wide range of applications, including the detection of cellular and molecular mechanisms and the identification and introduction of novel potential diagnostic and ...
Seyed Sajjad Zadian   +6 more
wiley   +1 more source

Combinatorial group theory and public key cryptography

open access: yes, 2004
After some excitement generated by recently suggested public key exchange protocols due to Anshel-Anshel-Goldfeld and Ko-Lee et al., it is a prevalent opinion now that the conjugacy search problem is unlikely to provide sufficient level of security if a ...
Shpilrain, Vladimir, Zapata, Gabriel
core   +2 more sources

Some cryptographic algorithms [PDF]

open access: yes, 2014
Cryptography is the practice and study of techniques for secure communication in the presence of third parties, called adversaries. Modern cryptography is heavily based on mathematical theory and computer science practice.
Satpathy, S
core  

Teaching Python with team‐based learning: using cloud‐based notebooks for interactive coding education

open access: yesFEBS Open Bio, EarlyView.
This study presents a novel approach to teaching Python and bioinformatics using team‐based learning and cloud‐hosted notebooks. By integrating interactive coding into biomedical education, the method improves accessibility, student engagement, and confidence—especially for those without a computing background.
Nuno S. Osório, Leonardo D. Garma
wiley   +1 more source

Novel Architecture for Efficient Implementation of Modular Exponentiation Algorithm [PDF]

open access: yesInternational Journal of Web Research
One of the most difficult problems in web research is security. Cryptography is the fundamental technique utilized in secure communication. One key element of cryptography is Public-Key Cryptography (PKC).
Abdalhossein Rezai
doaj   +1 more source

Image Security using Visual Cryptography [PDF]

open access: yes, 2015
Informations are being transferred through open channels and the security of those informations has been prime concerns. Apart from many conventional cryptographic schemes, visual cryptographic techniques have also been in use for data and information ...
Bhuyan, Sangeeta
core  

Microbial profile of the appendix niche in acute appendicitis: a novel sampling approach

open access: yesFEBS Open Bio, EarlyView.
This study utilized a novel sampling method, ERAT (i.e. endoscopic retrograde appendicitis treatment)‐guided lumen aspiration, to obtain samples from the appendix, and shotgun metagenomic sequencing was performed for in situ characterization of the appendix microbiome in patients with acute appendicitis.
Huimin Ma   +10 more
wiley   +1 more source

Home - About - Disclaimer - Privacy