Results 61 to 70 of about 19,937 (276)

Chaotic Compilation for Encrypted Computing: Obfuscation but Not in Name [PDF]

open access: yes, 2019
An `obfuscation' for encrypted computing is quantified exactly here, leading to an argument that security against polynomial-time attacks has been achieved for user data via the deliberately `chaotic' compilation required for security properties in that ...
Breuer, Peter T.
core   +1 more source

Nanoscale Spatial Organization of ARC High‐ and Low‐Order Assemblies at Excitatory Synapses

open access: yesAdvanced Science, EarlyView.
ARC (Activity‐Regulated Cytoskeleton‐Associated protein) mediates synaptic plasticity by forming nanoscale assemblies in neurons. Using super‐resolution microscopy and time‐resolved anisotropy with targeted tagging, the study reveals low‐order ARC assemblies at synapses colocalizing with AMPARs, semi‐circular structures at endocytic zones, and 60–80 nm
Martina Damenti   +13 more
wiley   +1 more source

A Nanobody‐LNP Platform for Targeting and Relicensing Dendritic Cells for Potent Cancer Immunotherapy

open access: yesAdvanced Science, EarlyView.
Plastin‐2 (PLS2) is identified as a dual‐function receptor on DCs that mediates both nanoparticle uptake and immunomodulation. A nanobody‐LNP platform is engineered to integrate antigen delivery with relicensing DCs. The therapeutic strategy elicits potent anti‐tumor T cell responses and leads to significant inhibition of established tumors in vivo ...
Shugang Qin   +9 more
wiley   +1 more source

A note on the concept of obfuscation.

open access: yesТруды Института системного программирования РАН, 2004
In this paper we address the issue of defining security of program obfuscation. We argue that requirements to obfuscated programs may be different and are dependent on potential applications. Therefore three distinct models are suggested for studying the
N.P. Varnovsky
doaj  

Diversified Compilation Method Based on LLVM [PDF]

open access: yesJisuanji gongcheng
When diversifying projects composed of multiple C/C++ source files, most of the existing software diversification tools adopt the same diversification method for all functions in a single C/C++ source file, which leads to a single diversification method ...
CHEN Yingchao, WANG Junchao, PANG Jianmin, YUE Feng
doaj   +1 more source

The Faraday Scalpel: Electrochemical Nerve Lesioning Mechanisms Studied in Invertebrate Models

open access: yesAdvanced Science, EarlyView.
Direct‐current produces nerve lesioning through discrete electrochemical reactions. Using hypoxia‐sensitive locust nerves and hypoxia‐tolerant leech nerves, we map three injury pathways: cathodic oxygen reduction, cathodic alkalization, and anodic chloride oxidation. These findings establish electrochemical lesioning—the “Faraday Scalpel”—as a precise,
Petra Ondráčková   +5 more
wiley   +1 more source

Temperature‐Resilient Reconfigurable Physical Unclonable Function Driven by Pulse Modulation Using CMOS‐Integrated Spintronic Chips

open access: yesAdvanced Science, EarlyView.
A reconfigurable physical unclonable function is developed using CMOS‐integrated SOT‐MRAM chips, leveraging a dual‐pulse strategy and offering enhanced environmental robustness. A temperature‐compensation effect arising from the CMOS transistor and SOT‐MTJ is revealed and established as a key prerequisite for thermal resilience.
Min Wang   +7 more
wiley   +1 more source

Systemization of Pluggable Transports for Censorship Resistance [PDF]

open access: yes, 2016
An increasing number of countries implement Internet censorship at different scales and for a variety of reasons. In particular, the link between the censored client and entry point to the uncensored network is a frequent target of censorship due to the ...
Khattak, Sheharbano   +2 more
core  

Software code protection through software obfuscation [PDF]

open access: yes, 2019
The mode of platform-independent software running on client machine has various advantages. But it also introduces some problems, such as how to guard against software piracy, how to protect user from intellectual property theft and from attacks by malicious modifications.
openaire   +2 more sources

Home - About - Disclaimer - Privacy