Results 201 to 210 of about 2,844 (221)
Controlling the protein corona formation onto carbon nanomaterials (CNMs) enhances their functionalities as platforms for cancer theranostics. Here, we reviewed the effects of the intrinsic and acquired properties of CNMs on protein corona formation, the consequent biological and toxicological outcomes, and the strategies to reshape corona formation ...
Yajuan Zou +5 more
wiley +1 more source
SPARC (spatio‐chimeric, plasma‐based, anisotropic, and shear‐responsive construct) that integrates myogenic and vascular microenvironments within a single construct. The dual‐modulus matrix directs aligned myotube formation and endothelial network development, enabling a vascularized muscle implant that seamlessly anastomoses with host tissue and ...
Su Hyun Jung +6 more
wiley +1 more source
Hydrogel‐Based Airway‐on‐Tube With Perfusable Endothelial Lumen and Outward Epithelialization
A hydrogel‐based airway‐on‐tube platform featuring a perfusable endothelial lumen and outward epithelialization is presented. The system supports primary human bronchial epithelial and lung microvascular endothelial coculture under air‐liquid interface conditions.
Ali Doryab +8 more
wiley +1 more source
Some of the next articles are maybe not open access.
Performance enhancement of DSSS using rabbit Stream cipher
2011 IEEE International Conference on Control System, Computing and Engineering, 2011Over the last 50 years, a class of modulation techniques usually called “Spread Spectrum,” has been developed. This group of modulation techniques is characterized by its wide frequency spectra. The modulated output signals occupy a much greater bandwidth than the signal's baseband information bandwidth.
S. Sharmila, G. Umamaheshwari
exaly +2 more sources
ASIC Implementation of Rabbit Stream Cipher Encryption for Data
2019 IEEE International WIE Conference on Electrical and Computer Engineering (WIECON-ECE), 2019Over a network to secure information and to remain confidential cryptography plays a very important role in today’s life. Cryptography is an method of converting information to a non-understandable form and then being able to convert it to the understandable form by the recipient.
Chetan S
exaly +2 more sources
Comparison the insertion attack effects on randomness property of Dragon and Rabbit stream cipher
2013 International Conference on Computer, Control, Informatics and Its Applications (IC3INA), 2013Pseudorandom generator as the heart of security system is a potential target by an adversary to weaken or derail the system performance. One possible active attack on a pseudorandom generator is an insertion attack on a random sequence generated by the pseudo random number generator, in order to reduce or even omit the randomness property of the output
Desi Wulandari +3 more
exaly +2 more sources
Power analysis attack and countermeasure on the Rabbit Stream Cipher (position paper)
Proceedings of the 7th International Workshop on Software Engineering for Secure Systems, 2011Recently, there has been extensive research on mobile devices and stream cipher to increase security. The Rabbit stream cipher was selected for the final eSTREAM portfolio organized by EU ECRYPT and as one of algorithms of the ISO/IEC 18033-4 Stream Ciphers on ISO Security Standardization. As the Rabbit evaluated the complexity of side-channel analysis
KiSeok Bae +4 more
exaly +2 more sources
Hardware Framework for the Rabbit Stream Cipher
Lecture Notes in Computer Science, 2010Rabbit is a software-oriented synchronous stream cipher with very strong security properties and support for 128-bit keys. Rabbit is part of the European Union's eSTREAM portfolio of stream ciphers addressing the need for strong and computationally efficient (i.e., fast) ciphers. Extensive cryptanalysis confirms Rabbit's strength against modern attacks;
exaly +2 more sources
The security analysis on the rabbit stream cipher
International Journal on Information Technologies and SecurityIn recent years, stream cipher systems that have been traditionally designed using linear feedback shift register have been almost entirely compromised by algebraic attack methods. Thus, identifying a method to establish concepts for new-generation ciphers, prevent existing security problems, and design new stream cipher systems that consider both ...
exaly +2 more sources

