Results 71 to 80 of about 10,953 (251)

Inter-domain Identity-Based Proxy Re-encryption [PDF]

open access: yes, 2009
Proxy re-encryption is a cryptographic primitive developed to delegate the decryption right from one party (the delegator) to another (the delegatee). So far, research efforts have only been devoted to the intra-domain setting, where the delegator and the delegatee are registered in the same domain. In this paper, we investigate the proxy re-encryption
Tang, Qiang   +2 more
openaire   +2 more sources

An upstream open reading frame regulates expression of the mitochondrial protein Slm35 and mitophagy flux

open access: yesFEBS Letters, EarlyView.
This study reveals how the mitochondrial protein Slm35 is regulated in Saccharomyces cerevisiae. The authors identify stress‐responsive DNA elements and two upstream open reading frames (uORFs) in the 5′ untranslated region of SLM35. One uORF restricts translation, and its mutation increases Slm35 protein levels and mitophagy.
Hernán Romo‐Casanueva   +5 more
wiley   +1 more source

Chosen-ciphertext secure proxy re-encryption [PDF]

open access: yesProceedings of the 14th ACM conference on Computer and communications security, 2007
In a proxy re-encryption (PRE) scheme, a proxy is given special information that allows it to translate a ciphertext under one key into a ciphertext of the same message under a different key. The proxy cannot, however, learn anything about the messages encrypted under either key.
Ran Canetti, Susan Hohenberger
openaire   +1 more source

In situ molecular organization and heterogeneity of the Legionella Dot/Icm T4SS

open access: yesFEBS Letters, EarlyView.
We present a nearly complete in situ model of the Legionella Dot/Icm type IV secretion system, revealing its central secretion channel and identifying new components. Using cryo‐electron tomography with AI‐based modeling, our work highlights the structure, variability, and mechanism of this complex nanomachine, advancing understanding of bacterial ...
Przemysław Dutka   +11 more
wiley   +1 more source

Threshold re-encryption based secure deduplication method for cloud data with resistance against side channel attack

open access: yesTongxin xuebao, 2020
For security and efficiency problems in threshold based deduplication for cloud data,a novel method based on threshold re-encryption was proposed to deal with side channel attacks.A lightweight threshold re-encryption mechanism was presented to transfer ...
Xin TANG   +3 more
doaj   +2 more sources

A Fine-Grained User-Divided Privacy-Preserving Access Control Protocol in Smart Watch

open access: yesSensors, 2019
A smart watch is a kind of emerging wearable device in the Internet of Things. The security and privacy problems are the main obstacles that hinder the wide deployment of smart watches.
Liming Fang   +4 more
doaj   +1 more source

Conditional Proxy Broadcast Re-Encryption

open access: yes, 2009
A proxy re-encryption (PRE) scheme supports the delegation of decryption rights via a proxy, who makes the ciphertexts decryptable by the delegatee. PRE is useful in various applications such as encrypted email forwarding. In this paper, we introduce a more generalized notion of conditional proxy broadcast re-encryption (CPBRE).
CHU, Cheng-Kang   +4 more
openaire   +3 more sources

Sequence determinants of RNA G‐quadruplex unfolding by Arg‐rich regions

open access: yesFEBS Letters, EarlyView.
We show that Arg‐rich peptides selectively unfold RNA G‐quadruplexes, but not RNA stem‐loops or DNA/RNA duplexes. This length‐dependent activity is inhibited by acidic residues and is conserved among SR and SR‐related proteins (SRSF1, SRSF3, SRSF9, U1‐70K, and U2AF1).
Naiduwadura Ivon Upekala De Silva   +10 more
wiley   +1 more source

PICALM::MLLT10 translocated leukemia

open access: yesFEBS Letters, EarlyView.
This comprehensive review of PICALM::MLLT10 translocated acute leukemia provides an in‐depth review of the structure and function of CALM, AF10, and the fusion oncoprotein (1). The multifaceted molecular mechanisms of oncogenesis, including nucleocytoplasmic shuttling (2), epigenetic modifications (3), and disruption of endocytosis (4), are then ...
John M. Cullen   +7 more
wiley   +1 more source

Security Analysis and Performance Evaluation of Certificateless Proxy Re-Encryption for Blockchain Applications

open access: yesIEEE Access
Certificateless Proxy Re-Encryption (CL-PRE) eliminates certificate management and private key exposure risks for blockchain data sharing, but existing schemes have critical security vulnerabilities and performance limitations.
S. Remya   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy