Results 61 to 70 of about 14,415,212 (341)

Heuristic Methods for Security Protocols

open access: yes, 2009
Model checking is an automatic verification technique to verify hardware and software systems. However it suffers from state-space explosion problem. In this paper we address this problem in the context of cryptographic protocols by proposing a security ...
Nizamani, Qurat ul Ain, Tuosto, Emilio
core   +2 more sources

‘Killing a mosquito with a hammer’: Al-Shabaab violence and state security responses in Kenya

open access: yes, 2017
Networked, transnational forms of violence pose a significant threat to peace and security in a number of sub-Saharan African countries. In recent years, Kenya has witnessed an expanding number of attacks involving Al-Shabaab – the Somali-based militant ...
J. Lind, P. Mutahi, M. Oosterom
semanticscholar   +1 more source

Therapeutic Apheresis for Intravenous Methylprednisolone‐Refractory Neuromyelitis Optica Spectrum Disorder: Clinical and Radiological Outcomes in a Single‐Center Case Series

open access: yesTherapeutic Apheresis and Dialysis, EarlyView.
ABSTRACT Background Neuromyelitis optica spectrum disorder (NMOSD) is a relapsing autoimmune disease of the central nervous system. High‐dose intravenous methylprednisolone (IVMP) is the standard first‐line therapy for acute attacks, although some patients remain refractory.
Wataru Horiguchi   +5 more
wiley   +1 more source

Safety of modern Kazakhstan society and privacy: the definition of balance

open access: yesХабаршы. Заң сериясы, 2017
The priority of human rights and freedoms – the guiding principle of relations of the individual and the state. The state should be linked with human rights.
Zhetpisov S.K., Alibayeva G.A.
doaj  

The United Nations and 21st century security challenges in Colombia

open access: yesRevista Científica General José María Córdova, 2021
Multifaceted 21st-century security challenges, such as terrorism, pandemics, illegal migration, and drug trafficking, permanently question the adequacy of both state and global organizations to guarantee general wellbeing, the rule of law, and the ...
Fredy Leonardo Galindo-García   +1 more
doaj   +1 more source

Decoy State Quantum Key Distribution With Modified Coherent State

open access: yes, 2007
To beat PNS attack, decoy state quantum key distribution (QKD) based on coherent state has been studied widely. We present a decoy state QKD protocol with modified coherent state (MCS).
C. H. Bennett   +6 more
core   +1 more source

A Systematic Review of the State of Cyber-Security in Water Systems

open access: yesWater, 2021
Critical infrastructure systems are evolving from isolated bespoke systems to those that use general-purpose computing hosts, IoT sensors, edge computing, wireless networks and artificial intelligence.
N. Tuptuk   +3 more
semanticscholar   +1 more source

An isoform of 14‐3‐3 protein regulates transbilayer lipid movement at the plasma membrane

open access: yesFEBS Letters, EarlyView.
Loss of 14‐3‐3ζ in CHO cells confers resistance to exogenous phosphatidylserine (PS) and impairs endocytosis‐independent inward flip‐flop of fluorescent PS at the plasma membrane. RNAi‐mediated knockdown reproduces this defect, while no additive effect is seen in ATP11C‐deficient cells.
Akiko Yamaji‐Hasegawa   +3 more
wiley   +1 more source

Dammarenediol II enhances etoposide‐induced apoptosis by targeting O‐GlcNAc transferase and Akt/GSK3β/mTOR signaling in liver cancer

open access: yesMolecular Oncology, EarlyView.
Etoposide induces DNA damage, activating p53‐dependent apoptosis via caspase‐3/7, which cleaves PARP1. Dammarenediol II enhances this apoptotic pathway by suppressing O‐GlcNAc transferase activity, further decreasing O‐GlcNAcylation. The reduction in O‐GlcNAc levels boosts p53‐driven apoptosis and influences the Akt/GSK3β/mTOR signaling pathway ...
Jaehoon Lee   +8 more
wiley   +1 more source

Prospects and Current Status of Defence Information Security in Ukraine

open access: yesHasanuddin Law Review, 2022
Relevance of the article - security has always been one of the priority issues of state policy. Considering that the defence forces are an inseparable part of state security, studying their information security is essential. The feasibility of this study
Olha O. Zolotar   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy