Skip to Content
You are currently on the new version of our website. Access the old version .

187 Results Found

  • Article
  • Open Access
14 Citations
5,480 Views
22 Pages

Often clients (e.g., sensors, organizations) need to outsource joint computations that are based on some joint inputs to external untrusted servers. These computations often rely on the aggregation of data collected from multiple clients, while the c...

  • Article
  • Open Access
1,100 Views
25 Pages

Secret Cryptographic Key Sharing Through the Integer Partition Function

  • Daniel Fernandes da Nobrega,
  • Marcio Luís Munhoz Amorim,
  • Sérgio F. Lopes,
  • João Paulo Carmo,
  • José A. Afonso and
  • Mario Gazziro

25 July 2025

Secret key exchange is a necessary function for modern cryptography. The integer partition function is a mathematical function that arises from number theory. New methods for computing the integer partition function were developed and evaluated in th...

  • Article
  • Open Access
1 Citations
976 Views
25 Pages

7 June 2025

This paper presents Sillcom, a high-performance secure indoor localization scheme designed to minimize both communication and computational costs while preserving participants’ privacy. Unlike existing privacy-preserving indoor localization tec...

  • Article
  • Open Access
1,409 Views
31 Pages

Composable Privacy-Preserving Framework for Stakes-Based Online Peer-to-Peer Applications

  • Nikola Hristov-Kalamov,
  • Raúl Fernández-Ruiz,
  • Agustín Álvarez-Marquina,
  • Julio Guillén-García,
  • Roberto Gallardo-Cava and
  • Daniel Palacios-Alonso

As the demand for expansive back-end systems in online applications continues to grow, novel frameworks are necessitated to address the escalating operational demands, energy consumption, and associated costs. Traditional Client–Server models,...

  • Feature Paper
  • Article
  • Open Access
1 Citations
2,292 Views
24 Pages

25 April 2025

Federated Learning (FL) enables collaborative model training across distributed users, while preserving data privacy by only sharing model updates. However, secure aggregation, which is essential to prevent data leakage during this process, often inc...

  • Article
  • Open Access
1,117 Views
25 Pages

A Modifiable Blockchain Based on the RE-TNG Node Selection Method

  • Rongtao Chen,
  • Chao Li,
  • Bingrong Dai and
  • Shaohua Zhang

23 January 2025

Blockchain technology, characterized by its immutability and decentralization, enables the creation of permanent and tamper-resistant records once data are uploaded, making it widely applicable in scenarios requiring data authenticity and reliability...

  • Article
  • Open Access
10 Citations
5,519 Views
16 Pages

8 October 2022

XOR-based Visual Cryptography Scheme (XOR-based VCS) is a method of secret image sharing. The principle of XOR-based VCS is to encrypt a secret image into several encrypted images, called shares. No information about the secret can be obtained from a...

  • Article
  • Open Access
1,056 Views
11 Pages

29 February 2024

Threshold schemes are used among cryptographic techniques for splitting visual data. Such methods allow the generation of a number of secret shares, a certain number of which need to be assembled in order to reconstruct the original image. Traditiona...

  • Article
  • Open Access
1 Citations
1,185 Views
18 Pages

Secret Sharing Scheme with Share Verification Capability

  • Nursulu Kapalova,
  • Armanbek Haumen and
  • Kunbolat Algazy

16 September 2025

This paper examines the properties of classical secret sharing schemes used in information protection systems, including the protection of valuable and confidential data. It addresses issues such as implementation complexity, limited flexibility, vul...

  • Article
  • Open Access
1 Citations
1,632 Views
16 Pages

Verifiable Additive Homomorphic Secret Sharing with Dynamic Aggregation Support

  • Sinan Wang,
  • Changgen Peng,
  • Xinxin Deng,
  • Zongfeng Peng and
  • Qihong Chen

(n,m,t)-Homomorphic Secret Sharing (HSS) allows n clients to share data secretly to m servers, which compute a function f homomorphically on the received secretly shared data while restricting the input data acquired by a collection of t servers to p...

  • Article
  • Open Access
8 Citations
4,605 Views
19 Pages

4 January 2024

Quantum key distribution protocols allow two honest distant parties to establish a common truly random secret key in the presence of powerful adversaries, provided that the two users share a short secret key beforehand. This pre-shared secret key is...

  • Article
  • Open Access
3,627 Views
22 Pages

A n-out-of-n Sharing Digital Image Scheme by Using Color Palette

  • Ching-Nung Yang,
  • Qin-Dong Sun,
  • Yan-Xiao Liu and
  • Ci-Ming Wu

A secret image sharing (SIS) scheme inserts a secret message into shadow images in a way that if shadow images are combined in a specific way, the secret image can be recovered. A 2-out-of-2 sharing digital image scheme (SDIS) adopts a color palette...

  • Article
  • Open Access
5 Citations
2,351 Views
18 Pages

17 February 2023

Linear codes with a few weights have been extensively studied due to their wide applications in secret sharing schemes, strongly regular graphs, association schemes, and authentication codes. In this paper, we choose the defining sets from two distin...

  • Article
  • Open Access
576 Views
20 Pages

Role-Based Efficient Proactive Secret Sharing with User Revocation

  • Yixuan He,
  • Yuta Kodera,
  • Yasuyuki Nogami and
  • Samsul Huda

Proactive secret sharing (PSS), an extension of secret-sharing schemes, safeguards sensitive data in dynamic distributed networks by periodically refreshing shares to counter adversarial attacks. In our previous work, we constructed a non-interactive...

  • Article
  • Open Access
1 Citations
1,675 Views
23 Pages

10 September 2024

Unmanned aerial vehicles (UAVs) are promising tools in mobile communication due to their flexibility. However, the rapid development of mobile communications further intensifies the challenge of spectrum scarcity, necessitating spectrum sharing with...

  • Article
  • Open Access
1 Citations
1,444 Views
22 Pages

28 February 2025

Many leading technology companies currently offer Machine Learning as a Service Platform, enabling developers and organizations to access the inference capabilities of pre-trained models via API calls. However, due to concerns over user data privacy,...

  • Review
  • Open Access
5 Citations
3,379 Views
14 Pages

Unlike a prevalent expectation that tumor cells secrete tumor-promoting proteins and stimulate the progression of neighboring tumor cells, accumulating evidence indicates that the role of tumor-secreted proteins is double-edged and context-dependent....

  • Article
  • Open Access
364 Views
16 Pages

Proteomics and Bioinformatics Profiles of Human Mesothelial Cell Line MeT-5A

  • Rachel L. Watkin,
  • Avedis A. Kazanjian,
  • Jennifer R. Damicis and
  • Elizabeth Yohannes

Background: Despite existing proteomics studies of other cell types, a comprehensive proteome of mesothelial cells has not been characterized. This study establishes a crucial baseline proteome for mesothelial cells to better understand their fundame...

  • Article
  • Open Access
1 Citations
1,240 Views
15 Pages

Necrosis-Suppressing Effector Protein ChEC88 Adopts a Novel Structural Motif Conserved Among Genus-Spanning Hemibiotrophic Phytopathogens

  • Shinya Ohki,
  • Hiroyuki Takahara,
  • Tomohiro Imamura,
  • Kosei Sakane,
  • Asihan Bai,
  • Kazunori Sasaki,
  • Takumi Nishiuchi and
  • Masashi Mori

18 August 2025

Phytopathogenic fungi secrete numerous effector proteins to disrupt plant defenses. At present, their sequence–structure–function relationships remain poorly understood owing to their diversity. Comprehensive understanding of conserved ef...

  • Article
  • Open Access
58 Citations
7,058 Views
15 Pages

Homomorphic Encryption Based Privacy-Preservation for IoMT

  • Mikail Mohammed Salim,
  • Inyeung Kim,
  • Umarov Doniyor,
  • Changhoon Lee and
  • Jong Hyuk Park

20 September 2021

Healthcare applications store private user data on cloud servers and perform computation operations that support several patient diagnoses. Growing cyber-attacks on hospital systems result in user data being held at ransom. Furthermore, mathematical...

  • Review
  • Open Access
6 Citations
7,814 Views
26 Pages

Lattice-Based Threshold Secret Sharing Scheme and Its Applications: A Survey

  • Jingyu Chen,
  • Haitao Deng,
  • Huachang Su,
  • Minghao Yuan and
  • Yongjun Ren

As the most popular cryptographic scheme in the post-quantum field, lattices have received extensive attention and research. Not only do they provide quantum-resistant security, they also enable the construction of complex applications. Currently, la...

  • Article
  • Open Access
2 Citations
3,341 Views
16 Pages

14 November 2019

Several results relating additive ideals of numerical semigroups and algebraic-geometry

codes are presented. In particular, we deal with the set of non-redundant parity-checks, the code

length, the generalized Hamming weights, and the isometry-dual seq...

  • Article
  • Open Access
7 Citations
8,430 Views
10 Pages

In conventional cryptography, information-theoretically secure message authentication can be achieved by means of universal hash functions, and requires that the two legitimate users share a random secret key, which is at least twice as long as the t...

  • Review
  • Open Access
15 Citations
9,549 Views
26 Pages

18 March 2013

Polar expansion is a widespread phenomenon in plants spanning all taxonomic groups from the Charophycean Green Algae to pollen tubes in Angiosperms and Gymnosperms. Current data strongly suggests that many common features are shared amongst cells dis...

  • Editorial
  • Open Access
1 Citations
5,298 Views
5 Pages

13 September 2016

Entropy is a basic and important concept in information theory. It is also often used as a measure of the unpredictability of a cryptographic key in cryptography research areas. Ubiquitous computing (Ubi-comp) has emerged rapidly as an exciting new p...

  • Article
  • Open Access
1 Citations
1,900 Views
15 Pages

Diversity, Distribution and Structural Prediction of the Pathogenic Bacterial Effectors EspN and EspS

  • Zhan Li,
  • Yuru Hu,
  • Yuan Song,
  • Deyu Li,
  • Xiaolan Yang,
  • Liangyan Zhang,
  • Tao Li and
  • Hui Wang

26 September 2024

Background: Many Gram-negative enterobacteria translocate virulence proteins (effectors) into intestinal epithelial cells using a type III secretion system (T3SS) to subvert the activity of various cell functions possess. Many T3SS effectors have bee...

  • Article
  • Open Access
13 Citations
10,096 Views
18 Pages

Short Toxin-like Proteins Attack the Defense Line of Innate Immunity

  • Yitshak Tirosh,
  • Dan Ofer,
  • Tsiona Eliyahu and
  • Michal Linial

23 July 2013

ClanTox (classifier of animal toxins) was developed for identifying toxin-like candidates from complete proteomes. Searching mammalian proteomes for short toxin-like proteins (coined TOLIPs) revealed a number of overlooked secreted short proteins wit...

  • Article
  • Open Access
9 Citations
3,699 Views
27 Pages

7 December 2022

Cybersecurity protocols enable several levels of protection against cyberattacks (digital attacks) that spread across network devices, platform programs, and network applications. On the Internet of Things (IoT), cyberattacks are generally intended t...

  • Article
  • Open Access
1 Citations
2,173 Views
15 Pages

Communication-Efficient Secure Federated Statistical Tests from Multiparty Homomorphic Encryption

  • Meenatchi Sundaram Muthu Selva Annamalai,
  • Chao Jin and
  • Khin Mi Mi Aung

11 November 2022

The power and robustness of statistical tests are strongly tied to the amount of data available for testing. However, much of the collected data today is siloed amongst various data owners due to privacy concerns, thus limiting the utility of the col...

  • Review
  • Open Access
37 Citations
7,624 Views
22 Pages

6 June 2020

Pseudomonas aeruginosa is one of the most prominent opportunistic bacteria in airways of cystic fibrosis patients and in immunocompromised patients. These bacteria share the same polymicrobial niche with other microbes, such as the opportunistic fung...

  • Article
  • Open Access
2 Citations
5,044 Views
22 Pages

25 September 2014

The entropy of a closure operator has been recently proposed for the study of network coding and secret sharing. In this paper, we study closure operators in relation to their entropy. We first introduce four different kinds of rank functions for a g...

  • Article
  • Open Access
2 Citations
3,756 Views
14 Pages

Entropic Matroids and Their Representation

  • Emmanuel Abbe and
  • Sophie Spirkl

27 September 2019

This paper investigates entropic matroids, that is, matroids whose rank function is given as the Shannon entropy of random variables. In particular, we consider p-entropic matroids, for which the random variables each have support of cardinality p. W...

  • Article
  • Open Access
2 Citations
1,480 Views
19 Pages

27 May 2024

Linear codes are the most important family of codes in cryptography and coding theory. Some codes only have a few weights and are widely used in many areas, such as authentication codes, secret sharing schemes and strongly regular graphs. By setting...

  • Article
  • Open Access
19 Citations
3,880 Views
19 Pages

12 September 2021

Banana Fusarium wilt, caused by the fungus pathogen Fusarium oxysporum f. sp. cubense (Foc), is a devastating disease that causes tremendous reductions in banana yield worldwide. Secreted proteins can act as pathogenicity factors and play important r...

  • Review
  • Open Access
13 Citations
4,700 Views
52 Pages

Kingella kingae RtxA Cytotoxin in the Context of Other RTX Toxins

  • Katerina Filipi,
  • Waheed Ur Rahman,
  • Adriana Osickova and
  • Radim Osicka

The Gram-negative bacterium Kingella kingae is part of the commensal oropharyngeal flora of young children. As detection methods have improved, K. kingae has been increasingly recognized as an emerging invasive pathogen that frequently causes skeleta...

  • Review
  • Open Access
203 Citations
14,915 Views
19 Pages

Role of HSP90 in Cancer

  • Bereket Birbo,
  • Elechi E. Madu,
  • Chikezie O. Madu,
  • Aayush Jain and
  • Yi Lu

25 September 2021

HSP90 is a vital chaperone protein conserved across all organisms. As a chaperone protein, it correctly folds client proteins. Structurally, this protein is a dimer with monomer subunits that consist of three main conserved domains known as the N-ter...

  • Article
  • Open Access
12 Citations
3,628 Views
16 Pages

14 December 2021

The inositol 1,4,5-triphosphate receptor-associated 2 (IRAG2) is also known as Jaw1 or lymphoid-restricted membrane protein (LRMP) and shares homology with the inositol 1,4,5-triphosphate receptor-associated cGMP kinase substrate 1 (IRAG1). IRAG1 int...

  • Article
  • Open Access
17 Citations
3,734 Views
21 Pages

Leakage of information in power line communication (PLC) networks is a threat to privacy and security. A way to enhance security is to encode the transmitted information with the use of a secret key. If the communication channel exhibits common chara...

  • Review
  • Open Access
100 Citations
12,460 Views
34 Pages

Scalable Production of Extracellular Vesicles and Its Therapeutic Values: A Review

  • Chiew Yong Ng,
  • Li Ting Kee,
  • Maimonah Eissa Al-Masawa,
  • Qian Hui Lee,
  • Thayaalini Subramaniam,
  • David Kok,
  • Min Hwei Ng and
  • Jia Xian Law

Extracellular vesicles (EVs) are minute vesicles with lipid bilayer membranes. EVs are secreted by cells for intercellular communication. Recently, EVs have received much attention, as they are rich in biological components such as nucleic acids, lip...

  • Article
  • Open Access
9 Citations
2,926 Views
13 Pages

24 July 2022

It is increasingly recognized that hypoxia may develop in adipose tissue as its mass expands. Adipose tissue is also the main reservoir of lipophilic pollutants, including polychlorinated biphenyls (PCBs). Both hypoxia and PCBs have been shown to alt...

  • Article
  • Open Access
8 Citations
2,695 Views
11 Pages

9 March 2021

In this paper, we study the entropy functions on extreme rays of the polymatroidal region which contain a matroid, i.e., matroidal entropy functions. We introduce variable strength orthogonal arrays indexed by a connected matroid M and positive integ...

  • Article
  • Open Access
15 Citations
3,235 Views
28 Pages

Attred: Attribute Based Resource Discovery for IoT

  • Mohammed B. Alshawki,
  • Yuping Yan,
  • Peter Ligeti and
  • Christoph Reich

10 July 2021

While the number of devices connected together as the Internet of Things (IoT) is growing, the demand for an efficient and secure model of resource discovery in IoT is increasing. An efficient resource discovery model distributes the registration and...

  • Review
  • Open Access
2 Citations
2,062 Views
23 Pages

Perspectives on the Parathyroid–Thymus Interconnection—A Literature Review

  • Maria-Paula Comănescu,
  • Otilia Boișteanu,
  • Delia Hînganu,
  • Marius Valeriu Hînganu,
  • Roxana Grigorovici and
  • Alexandru Grigorovici

The parathyroid and thymus glands are key components of the endocrine and immune systems, respectively, with intriguing developmental, anatomical, and functional interrelationships. This study starts from the hypothesis that, given their shared embry...

  • Article
  • Open Access
53 Citations
5,123 Views
23 Pages

Subcutaneous and Visceral Adipose-Derived Mesenchymal Stem Cells: Commonality and Diversity

  • Andreas Ritter,
  • Alexandra Friemel,
  • Susanne Roth,
  • Nina-Naomi Kreis,
  • Samira Catharina Hoock,
  • Babek Khan Safdar,
  • Kyra Fischer,
  • Charlotte Möllmann,
  • Christine Solbach and
  • Juping Yuan
  • + 1 author

21 October 2019

Adipose-derived mesenchymal stem cells (ASCs) are considered to be a useful tool for regenerative medicine, owing to their capabilities in differentiation, self-renewal, and immunomodulation. These cells have become a focus in the clinical setting du...

  • Review
  • Open Access
1 Citations
2,536 Views
18 Pages

Salmonella enterica is a leading cause of bacterial food-borne illness in humans and is responsible for millions of cases annually. A critical strategy for the survival of this pathogen is the translocation of bacterial virulence factors termed effec...

  • Article
  • Open Access
159 Citations
12,480 Views
16 Pages

Comparative Proteomic Analysis of the Mesenchymal Stem Cells Secretome from Adipose, Bone Marrow, Placenta and Wharton’s Jelly

  • Sungho Shin,
  • Jeongmin Lee,
  • Yumi Kwon,
  • Kang-Sik Park,
  • Jae-Hoon Jeong,
  • Suk-Joo Choi,
  • Sa Ik Bang,
  • Jong Wook Chang and
  • Cheolju Lee

Mesenchymal stem cells (MSCs) have the potential to be a viable therapy against various diseases due to their paracrine effects, such as secretion of immunomodulatory, trophic and protective factors. These cells are known to be distributed within var...

  • Article
  • Open Access
26 Citations
4,725 Views
19 Pages

25 October 2022

The Internet of Medical Things (IOMT) is critical in improving electronic device precision, dependability, and productivity. Researchers are driving the development of digital healthcare systems by connecting available medical resources and healthcar...

  • Article
  • Open Access
16 Citations
3,682 Views
22 Pages

Protecting Private Communications in Cyber-Physical Systems through Physical Unclonable Functions

  • Marina Pérez-Jiménez,
  • Borja Bordel Sánchez,
  • Andrea Migliorini and
  • Ramón Alcarria

Cyber-physical systems (CPS) are envisioned to change the whole of society. New engineered systems joining physical and digital solutions are being employed in industry, education, etc. These new systems are networked by default, and private informat...

  • Article
  • Open Access
814 Views
17 Pages

4 August 2025

The Karp and Rabin (KR) fingerprint is a special hash-like function widely utilized for efficient string matching. Recently, Sharma et al.leveraged its linear and symmetric properties to facilitate private database queries. However, their approach ma...

of 4