Results 31 to 40 of about 34,576 (259)

A Security Analysis of Deoxys and its Internal Tweakable Block Ciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2017
In this article, we provide the first independent security analysis of Deoxys, a third-round authenticated encryption candidate of the CAESAR competition, and its internal tweakable block ciphers Deoxys-BC-256 and Deoxys-BC-384.
Carlos Cid   +4 more
doaj   +1 more source

Fair and Square: Cake-Cutting in Two Dimensions

open access: yes, 2017
We consider the classic problem of fairly dividing a heterogeneous good ("cake") among several agents with different valuations. Classic cake-cutting procedures either allocate each agent a collection of disconnected pieces, or assume that the cake is a ...
Aumann, Yonatan   +3 more
core   +1 more source

Folds and Buckles at the Nanoscale: Experimental and Theoretical Investigation of the Bending Properties of Graphene Membranes [PDF]

open access: yes, 2013
The elastic properties of graphene crystals have been extensively investigated, revealing unique properties in the linear and nonlinear regimes, when the membranes are under either stretching or bending loading conditions. Nevertheless less knowledge has
CADELANO, EMILIANO   +5 more
core   +1 more source

Quarantine region scheme to mitigate spam attacks in wireless sensor networks [PDF]

open access: yes, 2006
The Quarantine Region Scheme (QRS) is introduced to defend against spam attacks in wireless sensor networks where malicious antinodes frequently generate dummy spam messages to be relayed toward the sink.
Cayirci, Erdal   +5 more
core   +1 more source

The ubiquitin ligase RNF115 is required for the clearance of damaged lysosomes

open access: yesFEBS Letters, EarlyView.
Upon lysosomal rupture, an E3 ubiquitin ligase RNF115 translocates from the cytosol to the damaged lysosomal membrane. Moreover, RNF115 depletion impairs the clearance of damaged lysosomes, identifying it as a key regulator of lysosomal quality control.
Sae Nakanaga   +3 more
wiley   +1 more source

Improved Search of Boomerang Distinguishers for Generalized Feistel and Application to WARP

open access: yesIACR Transactions on Symmetric Cryptology
Boomerang and rectangle cryptanalysis are powerful cryptanalytic techniques for security evaluation of block ciphers. Automated search for boomerang distinguishers is an important area of research. In FSE 2023, Hadipour et al.
Xinhao Zeng, Lin Tan, Hong Xu
doaj   +1 more source

Somatic mutational landscape in von Hippel–Lindau familial hemangioblastoma

open access: yesMolecular Oncology, EarlyView.
The causes of central nervous system (CNS) hemangioblastoma in Von Hippel–Lindau (vHL) disease are unclear. We used Whole Exome Sequencing (WES) on familial hemangioblastoma to investigate events that underlie tumor development. Our findings suggest that VHL loss creates a permissive environment for tumor formation, while additional alterations ...
Maja Dembic   +5 more
wiley   +1 more source

Cracking the Code: Genotype–Phenotype Correlation Models in Sarcoglycanopathies

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Sarcoglycanopathies are among the most severe limb‐girdle muscular dystrophies (LGMD), though milder presentations have been described. These diseases are primarily caused by missense variants, but the limited predictability of their effect on protein maturation, complex formation, and transport has hindered reliable genotype ...
Leonela Luce   +72 more
wiley   +1 more source

A Genetic Algorithm Tool (splicer) for Complex Scheduling Problems and the Space Station Freedom Resupply Problem [PDF]

open access: yes, 1993
The Space Station Freedom will require the supply of items in a regular fashion. A schedule for the delivery of these items is not easy to design due to the large span of time involved and the possibility of cancellations and changes in shuttle flights ...
Valenzuela-Rendon, Manuel, Wang, Lui
core   +1 more source

Home - About - Disclaimer - Privacy