Results 61 to 70 of about 1,130,311 (339)

Social Secret Sharing for Resource Management in Cloud [PDF]

open access: yesarXiv, 2013
We first explain the notion of secret sharing and also threshold schemes, which can be implemented with the Shamir's secret sharing. Subsequently, we review social secret sharing (NSG'10,NS'10) and its trust function. In a secret sharing scheme, a secret is shared among a group of players who can later recover the secret.
arxiv  

Breaking Mignotte's Sequence Based Secret Sharing Scheme Using SMT Solver [PDF]

open access: yes, 2018
The secret sharing schemes are the important tools in cryptography that are used as building blocks in many secured protocols. It is a method used for distributing a secret among the participants in a manner that only the threshold number of participants together can recover the secret and the remaining set of participants cannot get any information ...
arxiv   +1 more source

Identification of functional and diverse circulating cancer‐associated fibroblasts in metastatic castration‐naïve prostate cancer patients

open access: yesMolecular Oncology, EarlyView.
Cancer‐associated fibroblasts (CAFs) promote cancer growth, invasion (metastasis), and drug resistance. Here, we identified functional and diverse circulating CAFs (cCAFs) in patients with metastatic prostate cancer (mPCa). cCAFs were found in higher numbers and were functional and diverse in mPCa patients versus healthy individuals, suggesting their ...
Richell Booijink   +6 more
wiley   +1 more source

Effects of pregnancy on neuromyelitis optica spectrum disorder and predictors of related attacks

open access: yesAnnals of Clinical and Translational Neurology, Volume 9, Issue 12, Page 1918-1925, December 2022., 2022
Abstract Objective Our study aimed to investigate the influence of pregnancy on the course of neuromyelitis optica spectrum disorders (NMOSD) and to explore the independent predictors of pregnancy‐related attacks. Methods We performed a retrospective study of patients with NMOSD based on the Wingerchuk 2006 or the revised Wingerchuk 2015 criteria ...
Qin Du   +7 more
wiley   +1 more source

Generalized Secret Sharing using Permutation Ordered Binary System [PDF]

open access: yesarXiv, 2014
Secret sharing is a method of dividing a secret among n par- ticipants and allows only qualified subset to reconstruct the secret and hence provides better reliability and availability of secret data.In the generalized secret sharing scheme, a monotone access structure of the set of participants is considered. The access structure specifies a qualified
arxiv  

A Comparative Study of Software Secrets Reporting by Secret Detection Tools [PDF]

open access: yesarXiv, 2023
Background: According to GitGuardian's monitoring of public GitHub repositories, secrets sprawl continued accelerating in 2022 by 67% compared to 2021, exposing over 10 million secrets (API keys and other credentials). Though many open-source and proprietary secret detection tools are available, these tools output many false positives, making it ...
arxiv  

Secrets of a Secretin [PDF]

open access: yesStructure, 2013
Secretins are major constituents of bacterial type III secretion systems (T3SS). In this issue of Structure, Kowal and colleagues report on the cryo-EM structure of the native YscC secretin from Yersinia, revealing its internal symmetry and mode of length adaptation.
openaire   +3 more sources

Surfaceome: a new era in the discovery of immune evasion mechanisms of circulating tumor cells

open access: yesMolecular Oncology, EarlyView.
In the era of immunotherapies, many patients either do not respond or eventually develop resistance. We propose to pave the way for proteomic analysis of surface‐expressed proteins called surfaceome, of circulating tumor cells. This approach seeks to identify immune evasion mechanisms and discover potential therapeutic targets. Circulating tumor cells (
Doryan Masmoudi   +3 more
wiley   +1 more source

Vascular endothelial‐cadherin as a marker of endothelial injury in preclinical Alzheimer disease

open access: yesAnnals of Clinical and Translational Neurology, Volume 9, Issue 12, Page 1926-1940, December 2022., 2022
Abstract Objective Endothelial dysfunction is an early and prevalent pathology in Alzheimer disease (AD). We here investigate the value of vascular endothelial‐cadherin (VEC) as a cerebrospinal fluid (CSF) marker of endothelial injury in preclinical AD.
Rawan Tarawneh   +5 more
wiley   +1 more source

Threshold Multi Secret Sharing Using Elliptic Curve and Pairing [PDF]

open access: yesarXiv, 2016
Secret Sharing techniques are now the building blocks of several security protocols. A (t;n) threshold secret sharing scheme is one in which t or more participant can join together to retrieve the secret.Traditional single secret sharing schemes are modified and generalized to share multiple secrets.Use of elliptic curve and pairing in secret sharing ...
arxiv  

Home - About - Disclaimer - Privacy