Results 201 to 210 of about 2,844 (221)

Turning Unpredictable Biomolecule Adsorption to Controlled Corona Formation: Focus on Carbon Nanomaterials

open access: yesAdvanced Materials, EarlyView.
Controlling the protein corona formation onto carbon nanomaterials (CNMs) enhances their functionalities as platforms for cancer theranostics. Here, we reviewed the effects of the intrinsic and acquired properties of CNMs on protein corona formation, the consequent biological and toxicological outcomes, and the strategies to reshape corona formation ...
Yajuan Zou   +5 more
wiley   +1 more source

Mechanically Spatio‐Chimeric Fibrin Assembly Enables Vascular‐Integrated Muscle Reconstruction for Volumetric Muscle Loss Repair

open access: yesAdvanced Materials, EarlyView.
SPARC (spatio‐chimeric, plasma‐based, anisotropic, and shear‐responsive construct) that integrates myogenic and vascular microenvironments within a single construct. The dual‐modulus matrix directs aligned myotube formation and endothelial network development, enabling a vascularized muscle implant that seamlessly anastomoses with host tissue and ...
Su Hyun Jung   +6 more
wiley   +1 more source

Hydrogel‐Based Airway‐on‐Tube With Perfusable Endothelial Lumen and Outward Epithelialization

open access: yesAdvanced Materials, EarlyView.
A hydrogel‐based airway‐on‐tube platform featuring a perfusable endothelial lumen and outward epithelialization is presented. The system supports primary human bronchial epithelial and lung microvascular endothelial coculture under air‐liquid interface conditions.
Ali Doryab   +8 more
wiley   +1 more source
Some of the next articles are maybe not open access.

Performance enhancement of DSSS using rabbit Stream cipher

2011 IEEE International Conference on Control System, Computing and Engineering, 2011
Over the last 50 years, a class of modulation techniques usually called “Spread Spectrum,” has been developed. This group of modulation techniques is characterized by its wide frequency spectra. The modulated output signals occupy a much greater bandwidth than the signal's baseband information bandwidth.
S. Sharmila, G. Umamaheshwari
exaly   +2 more sources

ASIC Implementation of Rabbit Stream Cipher Encryption for Data

2019 IEEE International WIE Conference on Electrical and Computer Engineering (WIECON-ECE), 2019
Over a network to secure information and to remain confidential cryptography plays a very important role in today’s life. Cryptography is an method of converting information to a non-understandable form and then being able to convert it to the understandable form by the recipient.
Chetan S
exaly   +2 more sources

Comparison the insertion attack effects on randomness property of Dragon and Rabbit stream cipher

2013 International Conference on Computer, Control, Informatics and Its Applications (IC3INA), 2013
Pseudorandom generator as the heart of security system is a potential target by an adversary to weaken or derail the system performance. One possible active attack on a pseudorandom generator is an insertion attack on a random sequence generated by the pseudo random number generator, in order to reduce or even omit the randomness property of the output
Desi Wulandari   +3 more
exaly   +2 more sources

Power analysis attack and countermeasure on the Rabbit Stream Cipher (position paper)

Proceedings of the 7th International Workshop on Software Engineering for Secure Systems, 2011
Recently, there has been extensive research on mobile devices and stream cipher to increase security. The Rabbit stream cipher was selected for the final eSTREAM portfolio organized by EU ECRYPT and as one of algorithms of the ISO/IEC 18033-4 Stream Ciphers on ISO Security Standardization. As the Rabbit evaluated the complexity of side-channel analysis
KiSeok Bae   +4 more
exaly   +2 more sources

Hardware Framework for the Rabbit Stream Cipher

Lecture Notes in Computer Science, 2010
Rabbit is a software-oriented synchronous stream cipher with very strong security properties and support for 128-bit keys. Rabbit is part of the European Union's eSTREAM portfolio of stream ciphers addressing the need for strong and computationally efficient (i.e., fast) ciphers. Extensive cryptanalysis confirms Rabbit's strength against modern attacks;
exaly   +2 more sources

The security analysis on the rabbit stream cipher

International Journal on Information Technologies and Security
In recent years, stream cipher systems that have been traditionally designed using linear feedback shift register have been almost entirely compromised by algebraic attack methods. Thus, identifying a method to establish concepts for new-generation ciphers, prevent existing security problems, and design new stream cipher systems that consider both ...
exaly   +2 more sources

The Rabbit Stream Cipher

Lecture Notes in Computer Science, 2008
Martin Boesgaard   +2 more
exaly   +2 more sources

Home - About - Disclaimer - Privacy