Results 41 to 50 of about 564,681 (292)
Ideal hierarchical secret sharing schemes [PDF]
Hierarchical secret sharing is among the most natural generalizations of threshold secret sharing, and it has attracted a lot of attention from the invention of secret sharing until nowadays.
A. Beimel +30 more
core +1 more source
Function‐driven design of a surrogate interleukin‐2 receptor ligand
Interleukin (IL)‐2 signaling can be achieved and precisely fine‐tuned through the affinity, distance, and orientation of the heterodimeric receptors with their ligands. We designed a biased IL‐2 surrogate ligand that selectively promotes effector T and natural killer cell activation and differentiation. Interleukin (IL) receptors play a pivotal role in
Ziwei Tang +9 more
wiley +1 more source
Multilevel Threshold Secret and Function Sharing based on the Chinese Remainder Theorem [PDF]
A recent work of Harn and Fuyou presents the first multilevel (disjunctive) threshold secret sharing scheme based on the Chinese Remainder Theorem. In this work, we first show that the proposed method is not secure and also fails to work with a certain ...
Ersoy, Oguzhan +4 more
core +1 more source
Fourier-based Function Secret Sharing with General Access Structure
Function secret sharing (FSS) scheme is a mechanism that calculates a function f(x) for x in {0,1}^n which is shared among p parties, by using distributed functions f_i:{0,1}^n -> G, where G is an Abelian group, while the function f:{0,1}^n -> G is kept ...
A Beimel +5 more
core +1 more source
Neighbourhood-aware counter-based broadcast scheme for wireless ad hoc networks [PDF]
Broadcasting is a vital operation in mobile ad hoc networks (MANETs) and it is crucial to enhance its efficiency to ensure successful deployment. Although flooding is ideal for broadcast operations due to its simplicity and high reachability it ...
al-Humoud, S.O. +2 more
core +1 more source
We identified a systemic, progressive loss of protein S‐glutathionylation—detected by nonreducing western blotting—alongside dysregulation of glutathione‐cycle enzymes in both neuronal and peripheral tissues of Taiwanese SMA mice. These alterations were partially rescued by SMN antisense oligonucleotide therapy, revealing persistent redox imbalance as ...
Sofia Vrettou, Brunhilde Wirth
wiley +1 more source
On the equivalence of authentication codes and robust (2, 2)-threshold schemes
In this paper, we show a “direct” equivalence between certain authentication codes and robust threshold schemes. It was previously known that authentication codes and robust threshold schemes are closely related to similar types of designs, but direct ...
Paterson Maura B., Stinson Douglas R.
doaj +1 more source
Power Allocation Algorithm Minimizing Outage Probability in Cognitive Radio Relay Network [PDF]
To improve the outage performance of cognitive radio relay network,this paper proposes a power allocation algorithm minimizing outage probability by analyzing the system outage probability and user power allocation conditions.It presents the mathematical
ZHU Chunhua,ZHOU Yuping,CHEN Baoxing,ZHU Quan
doaj +1 more source
Mechanisms of IgE‐mediated food allergy and the role of allergen‐specific B cells
Food allergy arises when allergen‐specific B cells preferentially produce immunoglobulin E (IgE) antibodies against harmless foods. This article explains the mechanisms driving IgE‐mediated reactions, highlights the central role of these B cells, and discusses how natural tolerance (NT) and oral immunotherapy (OIT) can reshape allergic immune responses.
Juan‐Felipe López +2 more
wiley +1 more source
Perfect Detection of Spikes in the Linear Sub-threshold Dynamics of Point Neurons
Spiking neuronal networks are usually simulated with one of three main schemes: the classical time-driven and event-driven schemes, and the more recent hybrid scheme. All three schemes evolve the state of a neuron through a series of checkpoints: equally
Jeyashree Krishnan +10 more
doaj +1 more source

