Results 51 to 60 of about 1,111,411 (282)

An ideal multi-secret sharing scheme based on minimal privileged coalitions [PDF]

open access: yes, 2012
How to construct an ideal multi-secret sharing scheme for general access structures is difficult. In this paper, we solve an open problem proposed by Spiez et al.recently [Finite Fields and Their Application, 2011(17) 329-342], namely to design an ...
Li, Zhihui, Song, Yun
core   +1 more source

Selective Combining for Hybrid Cooperative Networks

open access: yes, 2014
In this study, we consider the selective combining in hybrid cooperative networks (SCHCNs scheme) with one source node, one destination node and $N$ relay nodes.
Huo, Qiang   +4 more
core   +1 more source

Organ‐specific redox imbalances in spinal muscular atrophy mice are partially rescued by SMN antisense oligonucleotides

open access: yesFEBS Letters, EarlyView.
We identified a systemic, progressive loss of protein S‐glutathionylation—detected by nonreducing western blotting—alongside dysregulation of glutathione‐cycle enzymes in both neuronal and peripheral tissues of Taiwanese SMA mice. These alterations were partially rescued by SMN antisense oligonucleotide therapy, revealing persistent redox imbalance as ...
Sofia Vrettou, Brunhilde Wirth
wiley   +1 more source

A Novel Secret Sharing Method Based on Binary Sequence

open access: yesDianxin kexue, 2015
A novel secret sharing method was proposed based on binary sequence,which was quite different from the traditional secret sharing method.This secret sharing method was based on binary secret sequence using bit operations.The secret here included but not ...
Yexia Cheng   +5 more
doaj  

Signcryption schemes with threshold unsigncryption, and applications [PDF]

open access: yes, 2014
The final publication is available at link.springer.comThe goal of a signcryption scheme is to achieve the same functionalities as encryption and signature together, but in a more efficient way than encrypting and signing separately. To increase security
Herranz Sotoca, Javier   +2 more
core   +2 more sources

Transferrin receptor 1‐mediated iron uptake supports thermogenic activation in human cervical‐derived adipocytes

open access: yesFEBS Letters, EarlyView.
In this study, we found that human cervical‐derived adipocytes maintain intracellular iron level by regulating the expression of iron transport‐related proteins during adrenergic stimulation. Melanotransferrin is predicted to interact with transferrin receptor 1 based on in silico analysis.
Rahaf Alrifai   +9 more
wiley   +1 more source

Gut microbiome and aging—A dynamic interplay of microbes, metabolites, and the immune system

open access: yesFEBS Letters, EarlyView.
Age‐dependent shifts in microbial communities engender shifts in microbial metabolite profiles. These in turn drive shifts in barrier surface permeability of the gut and brain and induce immune activation. When paired with preexisting age‐related chronic inflammation this increases the risk of neuroinflammation and neurodegenerative diseases.
Aaron Mehl, Eran Blacher
wiley   +1 more source

Multilevel Threshold Secret and Function Sharing based on the Chinese Remainder Theorem [PDF]

open access: yes, 2016
A recent work of Harn and Fuyou presents the first multilevel (disjunctive) threshold secret sharing scheme based on the Chinese Remainder Theorem. In this work, we first show that the proposed method is not secure and also fails to work with a certain ...
Ersoy, Oguzhan   +4 more
core   +1 more source

Multiparty Quantum Secret Sharing

open access: yes, 2004
Based on a quantum secure direct communication (QSDC) protocol [Phys. Rev. A69(04)052319], we propose a $(n,n)$-threshold scheme of multiparty quantum secret sharing of classical messages (QSSCM) using only single photons.
B. Schneier   +4 more
core   +1 more source

Generalized Linear Threshold Scheme [PDF]

open access: yes, 2007
A generalized linear threshold scheme is introduced. The new scheme generalizes the existing linear threshold schemes. The basic principles involved in the construction of linear threshold schemes are laid out and the relationships between the existing schemes are completely established.
openaire   +1 more source

Home - About - Disclaimer - Privacy