Results 31 to 40 of about 46,684 (278)

The Myth of Superiority of American Encryption Products [PDF]

open access: yes, 1998
Encryption software and hardware use sophisticated mathematical algorithms to encipher a message so that only the intended recipient may read it. Fearing that criminals and terrorists will use encryption to evade authorities, the United States now ...
Henry B. Wolfe
core  

In situ molecular organization and heterogeneity of the Legionella Dot/Icm T4SS

open access: yesFEBS Letters, EarlyView.
We present a nearly complete in situ model of the Legionella Dot/Icm type IV secretion system, revealing its central secretion channel and identifying new components. Using cryo‐electron tomography with AI‐based modeling, our work highlights the structure, variability, and mechanism of this complex nanomachine, advancing understanding of bacterial ...
Przemysław Dutka   +11 more
wiley   +1 more source

Tree based symmetric key broadcast encryption [PDF]

open access: yesJournal of Discrete Algorithms, 2015
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Bhattacherjee, Sanjay, Sarkar, Palash
openaire   +1 more source

Structural biology of ferritin nanocages

open access: yesFEBS Letters, EarlyView.
Ferritin is a conserved iron‐storage protein that sequesters iron as a ferric mineral core within a nanocage, protecting cells from oxidative damage and maintaining iron homeostasis. This review discusses ferritin biology, structure, and function, and highlights recent cryo‐EM studies revealing mechanisms of ferritinophagy, cellular iron uptake, and ...
Eloise Mastrangelo, Flavio Di Pisa
wiley   +1 more source

Linking neurogenesis, oligodendrogenesis, and myelination defects to neurodevelopmental disruption in primary mitochondrial disorders

open access: yesFEBS Letters, EarlyView.
Mitochondrial remodeling shapes neural and glial lineage progression by matching metabolic supply with demand. Elevated OXPHOS supports differentiation and myelin formation, while myelin compaction lowers mitochondrial dependence, revealing mitochondria as key drivers of developmental energy adaptation.
Sahitya Ranjan Biswas   +3 more
wiley   +1 more source

Implementasi Protokol Diffie-Hellman Dan Algoritma RC4 Untuk Keamanan Pesan SMS

open access: yesIJCCS (Indonesian Journal of Computing and Cybernetics Systems), 2015
Abstrack— SMS now becomes such a need for cellular phone users to communicate to other people. But the cellular phone users do not realize that the sent messages could be intercepted or changed by an unwanted party.
Decky Hendarsyah, Retantyo Wardoyo
doaj   +1 more source

Exploring Symmetric Encryption Using Large-Scale Archetypes [PDF]

open access: yes, 2018
Many researchers would agree that, had it not been for the transistor, the improvement of IPv7 might never have occurred. It might seem per- verse but often conflicts with the need to provide multi-processors to end-users.
Wiley, M. (Maxine)
core  

Encryption of Covert Information into Multiple Statistical Distributions

open access: yes, 2006
A novel strategy to encrypt covert information (code) via unitary projections into the null spaces of ill-conditioned eigenstructures of multiple host statistical distributions, inferred from incomplete constraints, is presented.
Bennett   +15 more
core   +1 more source

Peroxidasin enables melanoma immune escape by inhibiting natural killer cell cytotoxicity

open access: yesMolecular Oncology, EarlyView.
Peroxidasin (PXDN) is secreted by melanoma cells and binds the NK cell receptor NKG2D, thereby suppressing NK cell activation and cytotoxicity. PXDN depletion restores NKG2D signaling and enables effective NK cell–mediated melanoma killing. These findings identify PXDN as a previously unrecognized immune evasion factor and a potential target to improve
Hsu‐Min Sung   +17 more
wiley   +1 more source

Improved SAFER Plus Algorithm Using the Odd-Squared New Mersenne Number Transform

open access: yesProceedings of the International Conference on Applied Innovations in IT
Encryption secures data by transforming it into unreadable information (ciphertext) that can only be read by authorized receivers, who then convert the unclear data back into the original plaintext.
Abdulmutalib A-Wahab Hussein   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy