Results 51 to 60 of about 112,314 (333)
BCR sequencing and subclone analysis correlated immunoglobulin (Ig) chain loss in dysfunctional hybridomas with disrupted monoclonal antibody homeostasis. Proteomics‐guided CRISPR/Cas9 editing revealed that the unfolded protein response (UPR) regulates aberrant Ig synthesis.
Rubing Zou +9 more
wiley +1 more source
Schematic illustration of SiNDs composite materials synthesis and its internal photophysical process mechanism. And an AI‐assisted dynamic information encryption process. ABSTRACT Persistent luminescence materials typically encounter an intrinsic trade‐off between high phosphorescence quantum yield (PhQY) and ultralong phosphorescence lifetime.
Yulu Liu +9 more
wiley +1 more source
Renewable Multi-secret Sharing of Self-selecting Sub-secret [PDF]
The existing public verifiable multi-secret sharing schemes without trusted centers can not make sub-secrets self-selected and periodical renewable simultaneously.In order to solve the problem,a public verifiable and renewable multi-secret sharing scheme
GU Ting,DU Weizhang
doaj +1 more source
A Resilient Quantum Secret Sharing Scheme [PDF]
A resilient secret sharing scheme is supposed to generate the secret correctly even after some shares are damaged. In this paper, we show how quantum error correcting codes can be exploited to design a resilient quantum secret sharing scheme, where a quantum state is shared among more than one parties.
Maitra, Arpita, Paul, Goutam
openaire +3 more sources
Secure Secret Sharing With Adaptive Bandwidth in Distributed Cloud Storage Systems
The development of cloud storage technology has brought us great convenience that we can store data in remote servers and access it on any connected device.
Hailiang Xiong +4 more
doaj +1 more source
Hydrogen‐powered aviation offers a transformative pathway to zero‐emission flight by eliminating in‐flight CO2 emissions. Key considerations include propulsion systems (fuel cells and hydrogen combustion), cryogenic storage and insulation challenges, infrastructure and cost barriers, and supply‐chain constraints.
Mubasshira +4 more
wiley +1 more source
A Multisecret-Sharing Scheme Based on LCD Codes
Secret sharing is one of the most important cryptographic protocols. Secret sharing schemes (SSS) have been created to that end. This protocol requires a dealer and several participants.
Adel Alahmadi +5 more
doaj +1 more source
An Epitome of Multi Secret Sharing Schemes for General Access Structure [PDF]
Secret sharing schemes are widely used now a days in various applications, which need more security, trust and reliability. In secret sharing scheme, the secret is divided among the participants and only authorized set of participants can recover the ...
Binu, V P, Sreekumar, A
core
ABSTRACT Vending is an important sector in the daily lives of many people, and coffee is the most frequently consumed product in the European market. Like many other sectors, vending is responding to the challenge of sustainable development by taking various actions, such as offering increasingly ecologically sound coffee while maintaining/improving ...
Alberto Bertossi +2 more
wiley +1 more source
A Verifiable Multi-Secret Sharing Scheme for Hierarchical Access Structure
Sharing confidential information is a critical concern in today’s world. Secret sharing schemes facilitate the sharing of secrets in a way that ensures only authorized participants (shareholders) can access the secret using their allocated shares ...
Irfan Alam +3 more
doaj +1 more source

