Results 61 to 70 of about 14,415,212 (341)
Heuristic Methods for Security Protocols
Model checking is an automatic verification technique to verify hardware and software systems. However it suffers from state-space explosion problem. In this paper we address this problem in the context of cryptographic protocols by proposing a security ...
Nizamani, Qurat ul Ain, Tuosto, Emilio
core +2 more sources
‘Killing a mosquito with a hammer’: Al-Shabaab violence and state security responses in Kenya
Networked, transnational forms of violence pose a significant threat to peace and security in a number of sub-Saharan African countries. In recent years, Kenya has witnessed an expanding number of attacks involving Al-Shabaab – the Somali-based militant ...
J. Lind, P. Mutahi, M. Oosterom
semanticscholar +1 more source
ABSTRACT Background Neuromyelitis optica spectrum disorder (NMOSD) is a relapsing autoimmune disease of the central nervous system. High‐dose intravenous methylprednisolone (IVMP) is the standard first‐line therapy for acute attacks, although some patients remain refractory.
Wataru Horiguchi +5 more
wiley +1 more source
Safety of modern Kazakhstan society and privacy: the definition of balance
The priority of human rights and freedoms – the guiding principle of relations of the individual and the state. The state should be linked with human rights.
Zhetpisov S.K., Alibayeva G.A.
doaj
The United Nations and 21st century security challenges in Colombia
Multifaceted 21st-century security challenges, such as terrorism, pandemics, illegal migration, and drug trafficking, permanently question the adequacy of both state and global organizations to guarantee general wellbeing, the rule of law, and the ...
Fredy Leonardo Galindo-García +1 more
doaj +1 more source
Decoy State Quantum Key Distribution With Modified Coherent State
To beat PNS attack, decoy state quantum key distribution (QKD) based on coherent state has been studied widely. We present a decoy state QKD protocol with modified coherent state (MCS).
C. H. Bennett +6 more
core +1 more source
A Systematic Review of the State of Cyber-Security in Water Systems
Critical infrastructure systems are evolving from isolated bespoke systems to those that use general-purpose computing hosts, IoT sensors, edge computing, wireless networks and artificial intelligence.
N. Tuptuk +3 more
semanticscholar +1 more source
An isoform of 14‐3‐3 protein regulates transbilayer lipid movement at the plasma membrane
Loss of 14‐3‐3ζ in CHO cells confers resistance to exogenous phosphatidylserine (PS) and impairs endocytosis‐independent inward flip‐flop of fluorescent PS at the plasma membrane. RNAi‐mediated knockdown reproduces this defect, while no additive effect is seen in ATP11C‐deficient cells.
Akiko Yamaji‐Hasegawa +3 more
wiley +1 more source
Etoposide induces DNA damage, activating p53‐dependent apoptosis via caspase‐3/7, which cleaves PARP1. Dammarenediol II enhances this apoptotic pathway by suppressing O‐GlcNAc transferase activity, further decreasing O‐GlcNAcylation. The reduction in O‐GlcNAc levels boosts p53‐driven apoptosis and influences the Akt/GSK3β/mTOR signaling pathway ...
Jaehoon Lee +8 more
wiley +1 more source
Prospects and Current Status of Defence Information Security in Ukraine
Relevance of the article - security has always been one of the priority issues of state policy. Considering that the defence forces are an inseparable part of state security, studying their information security is essential. The feasibility of this study
Olha O. Zolotar +4 more
doaj +1 more source

