A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Critical Analysis and Improvement of AACS Drive-Host Authentication
[chapter]
Lecture Notes in Computer Science
This paper presents a critical analysis of the AACS drivehost authentication scheme. A few weaknesses are identified which could lead to various attacks on the scheme. ...
A proof of security of the modified scheme is also presented. The modified scheme achieves better efficiency than the original scheme. ...
Conclusion We have described three weaknesses in the AACS drive-host authentication scheme. Specifically, the scheme is susceptible to unknown key-share attack and man-in-the-middle attack. ...
doi:10.1007/978-3-540-70500-0_4
fatcat:gresvtqvk5aqjgdxpxq4o2ctom
A Review on Structured Scheme Representation on Data Security Application
2018
Indonesian Journal of Electrical Engineering and Computer Science
With the rapid development in the era of Internet and networking technology, there is always a requirement to improve the security systems, which secure the transmitted data over an unsecured channel. ...
These structured-scheme types are designed to improve and strengthen the security of data on the application. ...
As this scheme is focused on digital images, it attempts to overcome the weakness of existing system such as the alteration that happened to the host image and also to improve the robustness of some attacks ...
doi:10.11591/ijeecs.v11.i2.pp733-739
fatcat:zr32ik5qcnflvlgr2lcebtdxui
On Enabling Technologies for the Internet of Important Things
2019
IEEE Access
authentication, and the ability to aggregate data from a multiplicity of sources in the cloud. ...
This paper discusses and surveys architectural approaches, communication protocols, and programming models that promise to bridge the gap, enabling the use of the Internet technologies even in safety-critical ...
(1) We have shown that our work on hosting critical security infrastructure, such as authentication and authorization services, on edge computers can enhance reliability and resilience as well as improve ...
doi:10.1109/access.2019.2901509
fatcat:xsjcbtxi5feyxnkcrzmjkjkf3q
Response of human melanoma cell lines to interferon-beta gene transfer mediated by a modified adenoviral vector
2020
Scientific Reports
This study provides a critical advance in the development of our melanoma gene therapy approach. ...
The AdRGD-PG-hIFNβ vector provides extensive killing of human melanoma cells in vitro and a potent anti-tumor effect in vivo. ...
We thank Mara Junqueira and the staff of the animal facility for their cooperation. ...
doi:10.1038/s41598-020-74826-y
pmid:33087767
fatcat:t6mdci3odvdjpc5hs2strwovii
Functional Dissection of a Multimodular Polypeptide of the Pikromycin Polyketide Synthase into Monomodules by Using a Matched Pair of Heterologous Docking Domains
2009
ChemBioChem
Nadaraj Palaniappan and Dr. Galina Florova for technical advice on this project. Keywords: biosynthesis · natural products · polyketides ...
Detection and quantification of methymycin and pikromycin products was performed by using HPLC analysis combined with UV and MS (m/z 470 and 526 in positive mode) and confirmed with authentic standards ...
These interactions play a critical role in both the stabilization of the PKS homodimer and the docking interactions of the C-terminal ACP bound domain with the N-terminal DD of the subsequent KS. ...
doi:10.1002/cbic.200900098
pmid:19437523
pmcid:PMC4652847
fatcat:t5sklb3f2jer5llsvtpltuaxzq
Adaptive data protection in distributed systems
2013
Proceedings of the third ACM conference on Data and application security and privacy - CODASPY '13
security policies of various granularity, and synchronization protocols. ...
Second, although multiple copies may exist, a consistent view across copies should be maintained. ...
The AAC implements the authentication and authorization mechanisms, by exploiting the services offered by Java Authentication and Authorization Services (JAAS) [11] and Security Manager. ...
doi:10.1145/2435349.2435401
dblp:conf/codaspy/SquicciariniPB13
fatcat:up5bjrozoze3hgj44i7bhwjwse
Lytic infection with murine gammaherpesvirus 68 activates host and viral RNA polymerase III promoters and enhances non-coding RNA expression
2021
Journal of Virology
To compare the transcription of host and viral pol III-dependent ncRNAs, we analyzed a series of pol III promoters for host and viral ncRNAs using a luciferase reporter optimized to measure pol III activity ...
enhance viral gene expression and pathogenesis.IMPORTANCEGammaherpesviruses are a prime example of how viruses can alter the host transcriptional landscape to establish infection. ...
Though these methods each have different advantages and disadvantages, they 335 all indicate that lytic infection drives a general upregulation of promoter activity across multiple host and viral 336 pol ...
doi:10.1128/jvi.00079-21
pmid:33910955
pmcid:PMC8223928
fatcat:374x62wxyffofa5wsqakgn3gq4
Genome-minimized Streptomyces host for the heterologous expression of secondary metabolism
2010
Proceedings of the National Academy of Sciences of the United States of America
A critical requirement for such applications is the availability of the relevant biosynthetic gene clusters controlling the production of a secondary metabolite of interest as well as appropriate genetic ...
Comparative analysis of three taxonomically distinct Streptomyces genomes, S. avermitilis, S. coelicolor A3(2), and S. griseus, revealed a conserved core region of ∼6.28-6.50 Mb in which the majority of ...
Takano and K. Ueda of the College of Bioresource Sciences, Nihon University for providing cosmid clones SGR4C6 and SGR1A7. We also thank K. Machida, A. Arisawa, and T. ...
doi:10.1073/pnas.0914833107
pmid:20133795
pmcid:PMC2823899
fatcat:kmg2eflih5chplmj7i45fyniem
The decision-making process in recommending electronic communication aids for children and young people who are non-speaking: the I-ASC mixed-methods study
2020
Health Services and Delivery Research
Thematic analysis and framework approach supported the analysis of qualitative data. ...
Public involvement Two public involvement co-researchers, an adult using a symbol communication aid and a parent of a communication aid user, were core members of the research team. ...
They offered wise counsel, critical appraisal and genuine guidance, resulting in a far more robust outcome to the project. ...
doi:10.3310/hsdr08450
fatcat:vndkwif7w5au5ms5fk6zwphdnu
Engineered Streptomyces avermitilis Host for Heterologous Expression of Biosynthetic Gene Cluster for Secondary Metabolites
2013
ACS Synthetic Biology
Twenty of the entire biosynthetic gene clusters for secondary metabolites were successively cloned and introduced into a versatile model host S. avermitilis SUKA17 or 22. ...
in a versatile host. ...
and/or biological activity with comparison with each authentic sample. ...
doi:10.1021/sb3001003
pmid:23654282
pmcid:PMC3932656
fatcat:uqjjdqyfgzgdpiupdut7jpkryi
Profiling host ANP32A splicing landscapes to predict influenza A virus polymerase adaptation
2019
Nature Communications
Here, we establish host ANP32A as a critical driver of selection, and identify host-specific ANP32A splicing landscapes that predict viral evolution. ...
ANP32As with shorter inserts interact poorly with vPol, are compromised in supporting avian-like IAV replication, and drive selection of mammalian-adaptive vPol sequences with distinct kinetics. ...
Data availability The authors declare that all data supporting the findings of this study are available within the paper and its supplementary information files. ...
doi:10.1038/s41467-019-11388-2
pmid:31363119
pmcid:PMC6667478
fatcat:vrlosmmcbvh7fefz5zrfovgohi
MARVEL - D1.3: Architecture definition for MARVEL framework
2021
Zenodo
This deliverable is a living document that will be revised over the course of the project to account for the latest project achievements and updates of the relevant reference architectures and guidelines ...
The results of this deliverable will serve as a guideline towards the MARVEL Minimum Viable Product (MVP). ...
improve the security and well-being of their citizens. ...
doi:10.5281/zenodo.5463896
fatcat:ekassky3trcwraipozxsiokwja
Chip and PIN is Broken
2010
2010 IEEE Symposium on Security and Privacy
EMV secures credit and debit card transactions by authenticating both the card and the customer presenting it through a combination of cryptographic authentication codes, digital signatures, and the entry ...
of a PIN. ...
We also thank the merchants and cardholders who allowed us to carry out experiments, and Markus Kuhn for photography assistance. ...
doi:10.1109/sp.2010.33
dblp:conf/sp/MurdochDAB10
fatcat:phtckblebre5dngxiuep6hakeu
Reflex Autonomicity in an Agent-Based Security System :: The Autonomic Access Control System
2007
Fourth IEEE International Workshop on Engineering of Autonomic and Autonomous Systems (EASe'07)
This paper reports on an investigation of the use of the autonomic concepts of reflex autonomicity and apoptosis in the development of a multi-agent system. ...
to defend, optimize and heal. ...
Acknowledgements The wider context of the Autonomic Systems research is supported at the University of Ulster by the Computer Science Research Institute (CSRI) and the Centre for Software Process Technologies ...
doi:10.1109/ease.2007.22
fatcat:ya44aqiwfbc6dokrtjto2wwfea
Replication-Competent Infectious Hepatitis B Virus Vectors Carrying Substantially Sized Transgenes by Redesigned Viral Polymerase Translation
2013
PLoS ONE
We reasoned that duplicating the overlap region and providing artificial IRES control for translation of both Pol and an in-between inserted transgene might yield a functional tricistronic pgRNA, without ...
Translation of the downstream Pol ORF does not involve a conventional internal ribosome entry site (IRES). ...
close to the 39 end) that drives pgRNA transcription on the authentic, circular DNA genome. ...
doi:10.1371/journal.pone.0060306
pmid:23589756
pmcid:PMC3615001
fatcat:ilfhho75angknjh7z5khjlyoka
« Previous
Showing results 1 — 15 out of 432 results