首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6篇
  免费   0篇
化学   3篇
无线电   3篇
  2022年   1篇
  2021年   1篇
  2017年   1篇
  2007年   2篇
  2006年   1篇
排序方式: 共有6条查询结果,搜索用时 15 毫秒
1
1.
Security is becoming an everyday concern for a wide range of electronic systems that manipulate, communicate, and store sensitive data. An important and emerging category of such electronic systems are battery-powered mobile appliances, such as personal digital assistants (PDAs) and cell phones, which are severely constrained in the resources they possess, namely, processor, battery, and memory. This work focuses on one important constraint of such devices-battery life-and examines how it is impacted by the use of various security mechanisms. In this paper, we first present a comprehensive analysis of the energy requirements of a wide range of cryptographic algorithms that form the building blocks of security mechanisms such as security protocols. We then study the energy consumption requirements of the most popular transport-layer security protocol: Secure Sockets Layer (SSL). We investigate the impact of various parameters at the protocol level (such as cipher suites, authentication mechanisms, and transaction sizes, etc.) and the cryptographic algorithm level (cipher modes, strength) on the overall energy consumption for secure data transactions. To our knowledge, this is the first comprehensive analysis of the energy requirements of SSL. For our studies, we have developed a measurement-based experimental testbed that consists of an iPAQ PDA connected to a wireless local area network (LAN) and running Linux, a PC-based data acquisition system for real-time current measurement, the OpenSSL implementation of the SSL protocol, and parameterizable SSL client and server test programs. Based on our results, we also discuss various opportunities for realizing energy-efficient implementations of security protocols. We believe such investigations to be an important first step toward addressing the challenges of energy-efficient security for battery-constrained systems.  相似文献   
2.
Tribbles homolog 3 (TRIB3) protein is inhibiting the insulin signaling by directly binding to the Akt/PKB leading to insulin resistance in the pancreas causing type 2 diabetes mellitus. Hence, TRIB3 protein is considered as a possible drug target for the new lead identification against type 2 diabetes. In the present study, the homology model of TRIB3 protein was generated to explore its biochemical function and molecular interactions in the new lead identification. The energy minimization of TRIB3 protein was carried out and evaluated by validation protocols for structure reliability. The druggable binding site of TRIB3 protein was identified for the virtual screening and molecular docking studies. The Asinex-fragments library of 22634 small molecules was docked at TRIB3 active site using the Glide module to identify new chemical entities. A total of 9 molecules were identified as final hits from virtual screening and their potency was ranked using Glide score, Glide energies, and residues interactions. The 6 prioritized lead molecules were further optimized using AutoDock, Prime MM/GBSA, and percentage of human oral absorption for the identification of potential leads. The molecules L2, L5, and L6 are identified as lead inhibitors and are showing consistent interactions with key residues Glu194 and Lys196 of TRIB3 protein. The identified potential leads were analyzed by ADME properties for their drug likeness and HergIC50 values are predicted for the prevention of preclinical failures. The present work sheds light on the identification of the best lead molecules against TRIB3 protein and offers a route to design as novel potential drug candidates for T2DM.  相似文献   
3.
Cryptographic algorithms, irrespective of their theoretical strength, can be broken through weaknesses in their implementations. The most successful of these attacks are side-channel attacks which exploit unintended information leakage, e.g., timing information, power consumption, etc., from the implementation to extract the secret key. We propose a novel framework for implementing side-channel attacks where the attack is modeled as a search problem which takes the leaked information as its input, and deduces the secret key by using a satisfiability solver, a powerful Boolean reasoning technique. This approach can substantially enhance the scope of side-channel attacks by allowing a potentially wide range of internal variables to be exploited (not just those that are trivially related to the key). The proposed technique is particularly suited for attacking cryptographic software implementations which may inadvertently expose the values of intermediate variables in their computations (even though, they are very careful in protecting secret keys through the use of on-chip key generation and storage). We demonstrate our attack on standard software implementations of three popular cryptographic algorithms: DES, 3DES, and AES. Our attack technique is automated and does not require mathematical expertise on the part of the attacker  相似文献   
4.
Security protocols, such as IPSec and SSL, are being increasingly deployed in the context of networked embedded systems. The resource-constrained nature of embedded systems and, in particular, the modest capabilities of embedded processors make it challenging to achieve satisfactory performance while executing security protocols. A promising approach for improving performance in embedded systems is to use application-specific instruction set processors that are designed based on configurable and extensible processors. In this paper, we perform a comprehensive performance analysis of the IPSec protocol on a state-of-the-art configurable and extensible embedded processor (Xtensa from Tensilica Inc.). We present performance profiles of a lightweight embedded IPSec implementation running on the Xtensa processor, and examine in detail the various factors that contribute to the processing latencies, including cryptographic and protocol processing. In order to improve the efficiency of IPSec processing on embedded devices, we then study the impact of customizing an embedded processor by synergistically 1) configuring architectural parameters, such as instruction and data cache sizes, processor-memory interface width, write buffers, etc., and 2) extending the base instruction set of the processor using custom instructions for both cryptographic and protocol processing. Our experimental results demonstrate that upto 3.2times speedup in IPSec processing is possible over a popular embedded IPSec software implementation  相似文献   
5.
Cancer is characterized by abnormal growth of cells. Targeting ubiquitin proteins in the discovery of new anticancer therapeutics is an attractive strategy. The present study uses the structure-based drug discovery methods to identify new lead structures, which are selective to the putative ubiquitin-conjugating enzyme E2N-like (UBE2NL). The 3D structure of the UBE2NL was evaluated using homology modeling techniques. The model was validated using standard in silico methods. The hydrophobic pocket of UBE2NL that aids in binding with its natural receptor ubiquitin-conjugating enzyme E2 variant (UBE2V) was identified through protein-protein docking study. The binding site region of the UBE2NL was identified using active site prediction tools. The binding site of UBE2NL which is responsible for cancer cell progression is considered for docking study. Virtual screening study with the small molecular structural database was carried out against the active site of UBE2NL. The ligand molecules that have shown affinity towards UBE2NL were considered for ADME prediction studies. The ligand molecules that obey the Lipinski’s rule of five and Jorgensen’s rule of three pharmacokinetic properties like human oral absorption etc. are prioritized. The resultant ligand molecules can be considered for the development of potent UBE2NL enzyme inhibitors for cancer therapy.  相似文献   
6.
Structural Chemistry - MAP2K3 protein is mitogen-activated protein kinase belonging to the family of kinases involved in intracellular cell proliferation. The mammalian MAPK family that consists of...  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号