Results 51 to 60 of about 112,314 (333)

Quantitative Proteomics and CRISPR/Cas9 Editing Reveal UPR‐Mediated Control of Immunoglobulin Homeostasis in Hybridomas

open access: yesAdvanced Science, EarlyView.
BCR sequencing and subclone analysis correlated immunoglobulin (Ig) chain loss in dysfunctional hybridomas with disrupted monoclonal antibody homeostasis. Proteomics‐guided CRISPR/Cas9 editing revealed that the unfolded protein response (UPR) regulates aberrant Ig synthesis.
Rubing Zou   +9 more
wiley   +1 more source

Urea‐Formaldehyde Resin Confined Silicon Nanodots Composites: High‐Performance and Ultralong Persistent Luminescence for Dynamic AI Information Encryption

open access: yesAdvanced Science, EarlyView.
Schematic illustration of SiNDs composite materials synthesis and its internal photophysical process mechanism. And an AI‐assisted dynamic information encryption process. ABSTRACT Persistent luminescence materials typically encounter an intrinsic trade‐off between high phosphorescence quantum yield (PhQY) and ultralong phosphorescence lifetime.
Yulu Liu   +9 more
wiley   +1 more source

Renewable Multi-secret Sharing of Self-selecting Sub-secret [PDF]

open access: yesJisuanji gongcheng, 2016
The existing public verifiable multi-secret sharing schemes without trusted centers can not make sub-secrets self-selected and periodical renewable simultaneously.In order to solve the problem,a public verifiable and renewable multi-secret sharing scheme
GU Ting,DU Weizhang
doaj   +1 more source

A Resilient Quantum Secret Sharing Scheme [PDF]

open access: yesInternational Journal of Theoretical Physics, 2014
A resilient secret sharing scheme is supposed to generate the secret correctly even after some shares are damaged. In this paper, we show how quantum error correcting codes can be exploited to design a resilient quantum secret sharing scheme, where a quantum state is shared among more than one parties.
Maitra, Arpita, Paul, Goutam
openaire   +3 more sources

Secure Secret Sharing With Adaptive Bandwidth in Distributed Cloud Storage Systems

open access: yesIEEE Access, 2020
The development of cloud storage technology has brought us great convenience that we can store data in remote servers and access it on any connected device.
Hailiang Xiong   +4 more
doaj   +1 more source

The Future of Hydrogen‐Powered Aviation: Technologies, Challenges, and a Strategic Roadmap for Sustainable Decarbonization

open access: yesAdvanced Energy and Sustainability Research, EarlyView.
Hydrogen‐powered aviation offers a transformative pathway to zero‐emission flight by eliminating in‐flight CO2 emissions. Key considerations include propulsion systems (fuel cells and hydrogen combustion), cryogenic storage and insulation challenges, infrastructure and cost barriers, and supply‐chain constraints.
Mubasshira   +4 more
wiley   +1 more source

A Multisecret-Sharing Scheme Based on LCD Codes

open access: yesMathematics, 2020
Secret sharing is one of the most important cryptographic protocols. Secret sharing schemes (SSS) have been created to that end. This protocol requires a dealer and several participants.
Adel Alahmadi   +5 more
doaj   +1 more source

An Epitome of Multi Secret Sharing Schemes for General Access Structure [PDF]

open access: yes, 2014
Secret sharing schemes are widely used now a days in various applications, which need more security, trust and reliability. In secret sharing scheme, the secret is divided among the participants and only authorized set of participants can recover the ...
Binu, V P, Sreekumar, A
core  

Circularity, Sustainability, and the Quality of Coffee Sold via Vending Machines: What Do Italian Consumers Prefer?

open access: yesAgribusiness, EarlyView.
ABSTRACT Vending is an important sector in the daily lives of many people, and coffee is the most frequently consumed product in the European market. Like many other sectors, vending is responding to the challenge of sustainable development by taking various actions, such as offering increasingly ecologically sound coffee while maintaining/improving ...
Alberto Bertossi   +2 more
wiley   +1 more source

A Verifiable Multi-Secret Sharing Scheme for Hierarchical Access Structure

open access: yesAxioms
Sharing confidential information is a critical concern in today’s world. Secret sharing schemes facilitate the sharing of secrets in a way that ensures only authorized participants (shareholders) can access the secret using their allocated shares ...
Irfan Alam   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy