Results 81 to 90 of about 40,010 (281)

A survey and taxonomy of distributed certificate authorities in mobile ad hoc networks

open access: yesEURASIP Journal on Wireless Communications and Networking, 2011
Certificate authorities (CAs) are the main components of PKI that enable us for providing basic security services in wired networks and Internet. But, we cannot use centralized CAs, in mobile ad hoc networks (MANETs).
Jabbehdari Sam   +5 more
doaj  

Security and Privacy Issues in Wireless Mesh Networks: A Survey

open access: yes, 2013
This book chapter identifies various security threats in wireless mesh network (WMN). Keeping in mind the critical requirement of security and user privacy in WMNs, this chapter provides a comprehensive overview of various possible attacks on different ...
A. Gupta   +73 more
core   +1 more source

Longitudinal circulating tumor DNA profiling in patients with advanced endometrial cancer using an off‐the‐shelf targeted NGS panel

open access: yesMolecular Oncology, EarlyView.
Intratumour heterogeneity complicates precision management of advanced endometrial cancer. Circulating tumor DNA (ctDNA) offers a minimally invasive strategy to capture tumor evolution and therapeutic resistance. Here, we compare tumor‐agnostic NGS with tumor‐informed ddPCR, outlining their relative sensitivity, concordance, and clinical implications ...
Carlos Casas‐Arozamena   +15 more
wiley   +1 more source

(t, n) threshold secret sharing scheme without SDC

open access: yesTongxin xuebao, 2006
By means of the intractability of ellipse curve discrete logarithm problem(ECDLP),a(t,n) secret sharing threshold scheme based on ellipse curve cryptography was proposed.Generally speaking,there are two kinds of threshold schemes: a threshold scheme with
ZHOU Fu-cai   +3 more
doaj   +2 more sources

Partial Encryption of Co mpressed Image Using Threshold Quantization and AES Cipher [PDF]

open access: yesIraqi Journal for Electrical and Electronic Engineering, 2012
Cryptography is one of the technological means to provide security to data beingtransmitted on information and communication systems.When it is necessary to securelytransmit data in limited bandwidth, both compression and encryption must be performed ...
H.A.Younis, A.Y. Abdalla, Y. Abdalla
doaj  

A Distributed Public Key Infrastructure Based on Threshold Cryptography for the HiiMap Next Generation Internet Architecture

open access: yesFuture Internet, 2011
In this article, a security extension for the HiiMap Next Generation Internet Architecture is presented. We regard a public key infrastructure which is integrated into the mapping infrastructure of the locator/identifier-split addressing scheme.
Oliver Hanka   +4 more
doaj   +1 more source

Finding Significant Fourier Coefficients: Clarifications, Simplifications, Applications and Limitations [PDF]

open access: yes, 2018
Ideas from Fourier analysis have been used in cryptography for the last three decades. Akavia, Goldwasser and Safra unified some of these ideas to give a complete algorithm that finds significant Fourier coefficients of functions on any finite abelian ...
Galbraith, Steven D.   +2 more
core   +1 more source

Interaction of HS1BP3 with cortactin modulates TKS5 localisation, cell secretion and cancer malignancy

open access: yesMolecular Oncology, EarlyView.
Here, we demonstrate that HS1BP3 interacts with Cortactin through a proline‐rich region (PRR3.1) and show that this interaction, and HS1BP3 itself, promote cancer cell proliferation and invasion. Inhibition of this interaction leads to build‐up of TKS5 in multivesicular endosomes and altered secretion of CD63 and CD9, providing an explanation for the ...
Arja Arnesen Løchen   +9 more
wiley   +1 more source

An integral gated mode single photon detector at telecom wavelengths

open access: yes, 2007
We demonstrate an integral gated mode single photon detector at telecom wavelengths. The charge number of an avalanche pulse rather than the peak current is monitored for single-photon detection.
Bennett C H Brassard G   +10 more
core   +1 more source

Clinical performance of the urine‐based TERT promoter AbsoluteQ Digital PCR for non‐invasive detection of bladder cancer

open access: yesMolecular Oncology, EarlyView.
A urine‐based digital PCR assay targeting two hotspot TERT promoter variants detected bladder cancer with high sensitivity and no false positives in this case–control cohort. The streamlined AbsoluteQ workflow outperformed Sanger sequencing and supports non‐invasive molecular testing for bladder cancer detection.
Anna Nykel   +12 more
wiley   +1 more source

Home - About - Disclaimer - Privacy