Results 41 to 50 of about 48,518 (327)

Exploring Symmetric Encryption Using Large-Scale Archetypes [PDF]

open access: yes, 2018
Many researchers would agree that, had it not been for the transistor, the improvement of IPv7 might never have occurred. It might seem per- verse but often conflicts with the need to provide multi-processors to end-users.
Wiley, M. (Maxine)
core  

pH‐mediated activation of the lysosomal arginine sensor SLC38A9

open access: yesFEBS Letters, EarlyView.
Cells monitor nutrient levels via the lysosomal transporter SLC38A9 to activate the mechanistic target of rapamycin complex 1 (mTORC1). This study reveals that SLC38A9 function is regulated by pH. We identified histidine 544 as a critical pH sensor that undergoes conformational changes to control amino acid efflux from lysosomes; therefore, it ...
Xuelang Mu, Ampon Sae Her, Tamir Gonen
wiley   +1 more source

Improved SAFER Plus Algorithm Using the Odd-Squared New Mersenne Number Transform

open access: yesProceedings of the International Conference on Applied Innovations in IT
Encryption secures data by transforming it into unreadable information (ciphertext) that can only be read by authorized receivers, who then convert the unclear data back into the original plaintext.
Abdulmutalib A-Wahab Hussein   +2 more
doaj   +1 more source

Implementasi Protokol Diffie-Hellman Dan Algoritma RC4 Untuk Keamanan Pesan SMS

open access: yesIJCCS (Indonesian Journal of Computing and Cybernetics Systems), 2015
Abstrack— SMS now becomes such a need for cellular phone users to communicate to other people. But the cellular phone users do not realize that the sent messages could be intercepted or changed by an unwanted party.
Decky Hendarsyah, Retantyo Wardoyo
doaj   +1 more source

Encryption of Covert Information into Multiple Statistical Distributions

open access: yes, 2006
A novel strategy to encrypt covert information (code) via unitary projections into the null spaces of ill-conditioned eigenstructures of multiple host statistical distributions, inferred from incomplete constraints, is presented.
Bennett   +15 more
core   +1 more source

Establishment of a humanized patient‐derived xenograft mouse model of high‐grade serous ovarian cancer for preclinical evaluation of combination immunotherapy

open access: yesMolecular Oncology, EarlyView.
We have established a humanized orthotopic patient‐derived xenograft (Hu‐oPDX) mouse model of high‐grade serous ovarian cancer (HGSOC) that recapitulates human tumor–immune interactions. Using combined anti‐PD‐L1/anti‐CD73 immunotherapy, we demonstrate the model's improved biological relevance and enhanced translational value for preclinical ...
Luka Tandaric   +10 more
wiley   +1 more source

Using quantum key distribution for cryptographic purposes: a survey

open access: yes, 2014
The appealing feature of quantum key distribution (QKD), from a cryptographic viewpoint, is the ability to prove the information-theoretic security (ITS) of the established keys. As a key establishment primitive, QKD however does not provide a standalone
,   +23 more
core   +3 more sources

Raman‐based label‐free microscopic analysis of the pancreas in living zebrafish larvae

open access: yesFEBS Open Bio, EarlyView.
Forward stimulated Raman scattering (F‐SRS) and epi coherent anti‐Stokes Raman scattering (E‐CARS) allow label‐free discrimination of distinct subcellular structures in the pancreas of living zebrafish larvae. Given the straightforward applicability, we anticipate broad implementation of Raman microscopy in other organs and across various biomedical ...
Noura Faraj   +3 more
wiley   +1 more source

A Layered Searchable Encryption Scheme with Functional Components Independent of Encryption Methods

open access: yesThe Scientific World Journal, 2014
Searchable encryption technique enables the users to securely store and search their documents over the remote semitrusted server, which is especially suitable for protecting sensitive data in the cloud.
Guangchun Luo   +3 more
doaj   +1 more source

Searchable Symmetric Encryption

open access: yes, 2023
AbstractSearchable symmetric encryption allows operating on encrypted data, particularly keyword-based search on documents and range-based search on spatial data. Various methods can be used in Searchable symmetric encryption, such as order-preserving or fully homomorphic encryption, for different levels of information leakage.
Cyrill Krähenbühl, Adrian Perrig
openaire   +1 more source

Home - About - Disclaimer - Privacy