Results 111 to 120 of about 1,130,311 (339)

Almost-perfect secret sharing [PDF]

open access: yesarXiv, 2011
Splitting a secret s between several participants, we generate (for each value of s) shares for all participants. The goal: authorized groups of participants should be able to reconstruct the secret but forbidden ones get no information about it. In this paper we introduce several notions of non- perfect secret sharing, where some small information ...
arxiv  

THE SECRET OF TECHNIQUE [PDF]

open access: yesThe Musical Quarterly, 1916
IT is a source of wonder to many that while the average person has difficulty in attaining to even a fair degree of skill, certain individuals acquire quite a prodigious technical dexterity in their respective lines of work. It seems as if there must be some factor entering into the conditions more than the mere amount of labor and effort put forth by ...
openaire   +2 more sources

Inhibitor of DNA binding‐1 is a key regulator of cancer cell vasculogenic mimicry

open access: yesMolecular Oncology, EarlyView.
Elevated expression of transcriptional regulator inhibitor of DNA binding 1 (ID1) promoted cancer cell‐mediated vasculogenic mimicry (VM) through regulation of pro‐angiogenic and pro‐cancerous genes (e.g. VE‐cadherin (CDH5), TIE2, MMP9, DKK1). Higher ID1 expression also increased metastases to the lung and the liver.
Emma J. Thompson   +11 more
wiley   +1 more source

Transport and recycling of radiocesium in the alimentary tract of reindeer

open access: yesRangifer, 1990
Transport of radiocesium between the body pools and the alimentary tract was studied in 7 reindeer calves. Comparisons were made between reindeer receiving the Cs- binder Prussian blue (Ammon-ium-ironhexacyanoferrate) and untreated animals.
Hans Staaland   +2 more
doaj   +1 more source

Secret Key Generation from Correlated Sources and Secure Link [PDF]

open access: yesarXiv, 2017
In this paper, we study the problem of secret key generation from both correlated sources and a secure channel. We obtain the optimal secret key rate in this problem and show that the optimal scheme is to conduct secret key generation and key distribution jointly, where every bit in the secret channel will yield more than one bit of secret key rate ...
arxiv  

Open Secrets

open access: yes, 2011
The law of trade secrets is often conceptualized in bilateral terms, as creating and enforcing rights between trade secret owners, on the one hand, and misappropriators on the other hand. This paper, a chapter in a forthcoming collection on the law of trade secrets, argues that trade secrets and the law that guards them can serve structural and ...
openaire   +3 more sources

MIF as an oncogenic driver of low‐heterogeneity melanomas

open access: yesMolecular Oncology, EarlyView.
Shvefel and colleagues identified tumor‐secreted macrophage migration inhibitory factor (MIF) as an upregulated cytokine that mediates immune resistance in melanomas with low‐intratumoral heterogeneity. MIF and its functional paralogue D‐dopachrome tautomerase (D‐DT or MIF‐2) have overlapping but nonidentical signaling functions and are hypothesized to
Thuy T. Tran   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy