Results 71 to 80 of about 8,161,700 (320)

Diversity and complexity in neural organoids

open access: yesFEBS Letters, EarlyView.
Neural organoid research aims to expand genetic diversity on one side and increase tissue complexity on the other. Chimeroids integrate multiple donor genomes within single organoids. Self‐organising multi‐identity organoids, exogenous cell seeding, or enforced assembly of region‐specific organoids contribute to tissue complexity.
Ilaria Chiaradia, Madeline A. Lancaster
wiley   +1 more source

Field Test of Classical Symmetric Encryption with Continuous Variable Quantum Key Distribution

open access: yes, 2012
We report on the design and performance of a point-to-point classical symmetric encryption link with fast key renewal provided by a Continuous Variable Quantum Key Distribution (CVQKD) system. Our system was operational and able to encrypt point-to-point
Anthony Leverrier   +38 more
core   +3 more sources

Linking neurogenesis, oligodendrogenesis, and myelination defects to neurodevelopmental disruption in primary mitochondrial disorders

open access: yesFEBS Letters, EarlyView.
Mitochondrial remodeling shapes neural and glial lineage progression by matching metabolic supply with demand. Elevated OXPHOS supports differentiation and myelin formation, while myelin compaction lowers mitochondrial dependence, revealing mitochondria as key drivers of developmental energy adaptation.
Sahitya Ranjan Biswas   +3 more
wiley   +1 more source

Securing Cyber Physical Systems: Lightweight Industrial Internet of Things Authentication (LI2A) for Critical Infrastructure and Manufacturing

open access: yesApplied System Innovation
The increasing incorporation of Industrial Internet of Things (IIoT) devices into critical industrial operations and critical infrastructures necessitates robust security measures to safeguard confidential information and ensure dependable connectivity ...
Alaa T. Al Ghazo   +3 more
doaj   +1 more source

Codes for Key Generation in Quantum Cryptography

open access: yes, 2005
As an alternative to the usual key generation by two-way communication in schemes for quantum cryptography, we consider codes for key generation by one-way communication.
BERTHOLD-GEORG ENGLERT   +6 more
core   +2 more sources

AAA+ protein unfoldases—the Moirai of the proteome

open access: yesFEBS Letters, EarlyView.
AAA+ unfoldases are essential molecular motors that power protein degradation and disaggregation. This review integrates recent cryo‐electron microscopy (cryo‐EM) structures and single‐molecule biophysical data to reconcile competing models of substrate translocation.
Stavros Azinas, Marta Carroni
wiley   +1 more source

Cryptanalysis of a Proposal Based on the Discrete Logarithm Problem Inside Sn

open access: yesCryptography, 2018
In 2008, Doliskani et al. proposed an ElGamal-style encryption scheme using the symmetric group Sn as mathematical platform. In 2012, an improvement of the cryptosystem’s memory requirements was suggested by Othman. The proposal by Doliskani et al.
María Isabel González Vasco   +2 more
doaj   +1 more source

pH‐mediated activation of the lysosomal arginine sensor SLC38A9

open access: yesFEBS Letters, EarlyView.
Cells monitor nutrient levels via the lysosomal transporter SLC38A9 to activate the mechanistic target of rapamycin complex 1 (mTORC1). This study reveals that SLC38A9 function is regulated by pH. We identified histidine 544 as a critical pH sensor that undergoes conformational changes to control amino acid efflux from lysosomes; therefore, it ...
Xuelang Mu, Ampon Sae Her, Tamir Gonen
wiley   +1 more source

Adaptive authentication and key agreement mechanism for future cellular systems [PDF]

open access: yes, 2006
Since the radio medium can be accessed by anyone, authentication of users is a very important element of a mobile network. Nowadays, in GSM/GPRS a challenge response protocol is used to authenticate the user to the mobile network.
Dimitriou, T., Komninos, N.
core  

Practical Schemes For Privacy & Security Enhanced RFID

open access: yes, 2009
Proper privacy protection in RFID systems is important. However, many of the schemes known are impractical, either because they use hash functions instead of the more hardware efficient symmetric encryption schemes as a efficient cryptographic primitive,
Hoepman, J.H., Joosten, R., Samarati, P.
core   +5 more sources

Home - About - Disclaimer - Privacy