Search Results - logan+blue

5 Results Sort By:
y-AApeptide-based long-acting pan-coronavirus fusion inhibitor with dual targets in spike protein and oral bioavailability
­Advantages: S-20-1 demonstrates potent inhibitory action, this broad-spectrum activity suggests that S-20-1 could be effective against a wide range of coronaviruses, making it a valuable candidate for pandemic preparedness and management. The research provides insights into the mechanism of action of S-20-1, demonstrating its ability to bind...
Published: 9/25/2023   |   Inventor(s): Jianfeng Cai, Shibo JIANG, Lu LU, Songyi XUE, Xinling WANG, Lei WANG, Wei XU, Shuai XIA
Keywords(s): Drug Discovery, Immunology
Category(s): Technology Classifications > Medical > Biotechnology
Nature-inspired Functionally-graded UHMWPE + Kevlar Composites Achieve Extraordinarily High Strength
Nature-inspired polymers are achieved using unique processing to yield functional gradient composites with embedded Kevlar fibers exhibiting extraordinarily high strength lightweight UHMWPE materials. Background: Demand for new energy absorption materials and implantable polymeric biomaterials has increased significantly in recent years. The...
Published: 10/17/2024   |   Inventor(s): Shenqiang Ren, Lu An
Keywords(s): Technologies
Category(s): Campus > University at Buffalo, Technology Classifications > Materials and Chemicals, Technology Classifications > Nanotechnology, Technology Classifications > Engineering
Efficient Identification and Content Authentication for Phone Calls
Cryptographically Authenticates Phone Calls for Secure Personal and Professional CommunicationsThis application cryptographically verifies the identity of callers to ensure that phone calls are authentic, assuring users that their information is safe. Financial, medical, or other personal information is commonly communicated through phone calls or other...
Published: 6/27/2021   |   Inventor(s): Patrick Traynor, Bradley Reaves, Logan Blue, Luis Vargas, Hadi Abdullah, Thomas Shrimpton
Keywords(s): authentication, Caller ID, Phone Fraud
Category(s): Technology Classifications > Engineering > Computer Science
Convenient Caller ID Verification Protocol for All Telephony Networks
AuthLoop Allows Efficient Cryptographic Authentication via Voice ChannelThis caller ID verification system allows efficient authentication through the voice data channel, improving consumer security on phone calls occurring on any combination of available telephony networks. Sensitive information, including banking and credit card account authorizations,...
Published: 6/23/2022   |   Inventor(s): Patrick Traynor, Logan Blue, Bradley Reaves
Keywords(s): authentication, cryptography, phone
Category(s): Technology Classifications > Engineering > Computer Science
Network-Coded Multiple Access
[Licensing negotiation in progress] [Invitation for Expression of Interest - Deadline: 16 June 2016] Systems and methods include a first wireless local area network (WLAN) system that jointly exploit physical-layer network coding (PNC) and multi-user decoding (MUD) to boost system throughput. This multiple access mode is referred to as Network-Coded...
Published: 1/29/2024   |   Inventor(s): Soung Chang Liew, Lu LU, Lizhao You
Keywords(s): Network Coding, Wireless Local Area Network
Category(s): Information and Communications Technology