Results 61 to 70 of about 19,937 (276)
Chaotic Compilation for Encrypted Computing: Obfuscation but Not in Name [PDF]
An `obfuscation' for encrypted computing is quantified exactly here, leading to an argument that security against polynomial-time attacks has been achieved for user data via the deliberately `chaotic' compilation required for security properties in that ...
Breuer, Peter T.
core +1 more source
Nanoscale Spatial Organization of ARC High‐ and Low‐Order Assemblies at Excitatory Synapses
ARC (Activity‐Regulated Cytoskeleton‐Associated protein) mediates synaptic plasticity by forming nanoscale assemblies in neurons. Using super‐resolution microscopy and time‐resolved anisotropy with targeted tagging, the study reveals low‐order ARC assemblies at synapses colocalizing with AMPARs, semi‐circular structures at endocytic zones, and 60–80 nm
Martina Damenti +13 more
wiley +1 more source
Plastin‐2 (PLS2) is identified as a dual‐function receptor on DCs that mediates both nanoparticle uptake and immunomodulation. A nanobody‐LNP platform is engineered to integrate antigen delivery with relicensing DCs. The therapeutic strategy elicits potent anti‐tumor T cell responses and leads to significant inhibition of established tumors in vivo ...
Shugang Qin +9 more
wiley +1 more source
A note on the concept of obfuscation.
In this paper we address the issue of defining security of program obfuscation. We argue that requirements to obfuscated programs may be different and are dependent on potential applications. Therefore three distinct models are suggested for studying the
N.P. Varnovsky
doaj
Diversified Compilation Method Based on LLVM [PDF]
When diversifying projects composed of multiple C/C++ source files, most of the existing software diversification tools adopt the same diversification method for all functions in a single C/C++ source file, which leads to a single diversification method ...
CHEN Yingchao, WANG Junchao, PANG Jianmin, YUE Feng
doaj +1 more source
Software protection through obfuscation [PDF]
DOCTOR OF PHILOSOPHY (SCE)
openaire +2 more sources
The Faraday Scalpel: Electrochemical Nerve Lesioning Mechanisms Studied in Invertebrate Models
Direct‐current produces nerve lesioning through discrete electrochemical reactions. Using hypoxia‐sensitive locust nerves and hypoxia‐tolerant leech nerves, we map three injury pathways: cathodic oxygen reduction, cathodic alkalization, and anodic chloride oxidation. These findings establish electrochemical lesioning—the “Faraday Scalpel”—as a precise,
Petra Ondráčková +5 more
wiley +1 more source
A reconfigurable physical unclonable function is developed using CMOS‐integrated SOT‐MRAM chips, leveraging a dual‐pulse strategy and offering enhanced environmental robustness. A temperature‐compensation effect arising from the CMOS transistor and SOT‐MTJ is revealed and established as a key prerequisite for thermal resilience.
Min Wang +7 more
wiley +1 more source
Systemization of Pluggable Transports for Censorship Resistance [PDF]
An increasing number of countries implement Internet censorship at different scales and for a variety of reasons. In particular, the link between the censored client and entry point to the uncensored network is a frequent target of censorship due to the ...
Khattak, Sheharbano +2 more
core
Software code protection through software obfuscation [PDF]
The mode of platform-independent software running on client machine has various advantages. But it also introduces some problems, such as how to guard against software piracy, how to protect user from intellectual property theft and from attacks by malicious modifications.
openaire +2 more sources

