Results 81 to 90 of about 40,010 (281)
A survey and taxonomy of distributed certificate authorities in mobile ad hoc networks
Certificate authorities (CAs) are the main components of PKI that enable us for providing basic security services in wired networks and Internet. But, we cannot use centralized CAs, in mobile ad hoc networks (MANETs).
Jabbehdari Sam +5 more
doaj
Security and Privacy Issues in Wireless Mesh Networks: A Survey
This book chapter identifies various security threats in wireless mesh network (WMN). Keeping in mind the critical requirement of security and user privacy in WMNs, this chapter provides a comprehensive overview of various possible attacks on different ...
A. Gupta +73 more
core +1 more source
Intratumour heterogeneity complicates precision management of advanced endometrial cancer. Circulating tumor DNA (ctDNA) offers a minimally invasive strategy to capture tumor evolution and therapeutic resistance. Here, we compare tumor‐agnostic NGS with tumor‐informed ddPCR, outlining their relative sensitivity, concordance, and clinical implications ...
Carlos Casas‐Arozamena +15 more
wiley +1 more source
(t, n) threshold secret sharing scheme without SDC
By means of the intractability of ellipse curve discrete logarithm problem(ECDLP),a(t,n) secret sharing threshold scheme based on ellipse curve cryptography was proposed.Generally speaking,there are two kinds of threshold schemes: a threshold scheme with
ZHOU Fu-cai +3 more
doaj +2 more sources
Partial Encryption of Co mpressed Image Using Threshold Quantization and AES Cipher [PDF]
Cryptography is one of the technological means to provide security to data beingtransmitted on information and communication systems.When it is necessary to securelytransmit data in limited bandwidth, both compression and encryption must be performed ...
H.A.Younis, A.Y. Abdalla, Y. Abdalla
doaj
In this article, a security extension for the HiiMap Next Generation Internet Architecture is presented. We regard a public key infrastructure which is integrated into the mapping infrastructure of the locator/identifier-split addressing scheme.
Oliver Hanka +4 more
doaj +1 more source
Finding Significant Fourier Coefficients: Clarifications, Simplifications, Applications and Limitations [PDF]
Ideas from Fourier analysis have been used in cryptography for the last three decades. Akavia, Goldwasser and Safra unified some of these ideas to give a complete algorithm that finds significant Fourier coefficients of functions on any finite abelian ...
Galbraith, Steven D. +2 more
core +1 more source
Here, we demonstrate that HS1BP3 interacts with Cortactin through a proline‐rich region (PRR3.1) and show that this interaction, and HS1BP3 itself, promote cancer cell proliferation and invasion. Inhibition of this interaction leads to build‐up of TKS5 in multivesicular endosomes and altered secretion of CD63 and CD9, providing an explanation for the ...
Arja Arnesen Løchen +9 more
wiley +1 more source
An integral gated mode single photon detector at telecom wavelengths
We demonstrate an integral gated mode single photon detector at telecom wavelengths. The charge number of an avalanche pulse rather than the peak current is monitored for single-photon detection.
Bennett C H Brassard G +10 more
core +1 more source
A urine‐based digital PCR assay targeting two hotspot TERT promoter variants detected bladder cancer with high sensitivity and no false positives in this case–control cohort. The streamlined AbsoluteQ workflow outperformed Sanger sequencing and supports non‐invasive molecular testing for bladder cancer detection.
Anna Nykel +12 more
wiley +1 more source

