Sonali Patil

Learn More
BACKGROUND Dendritic cells are antigen-presenting cells that play an essential role in linking the innate and adaptive immune systems. Much research has focused on the signaling pathways triggered upon infection of dendritic cells by various pathogens. The high level of activity in the field makes it desirable to have a pathway-based resource to access the(More)
BACKGROUND Cellular processes depend on the function of intracellular molecular networks. The curation of the literature relevant to specific biological pathways is important for many theoretical and experimental research teams and communities. No current tool supports web publication or hosting of user-developed large scale annotated pathway diagrams.(More)
Secret Sharing Schemes (SSS) refers to method for distributing a secret amongst a group of participants, each of whom is allocated a share of the secret. The secret can be reconstructed only when a sufficient number of shares are combined together; individual shares are of no use on their own. Secret sharing has been an active research field for many years(More)
A 2-out-of-2 audio cr yptogr aphy is a secret shar ing scheme that can be used to hide a digital message into 2 sounds and human ear s can perceive the message by playing these 2 sounds simultaneously. In this paper a new (2, 2) Audio Cr yptogr aphy Scheme is proposed. The proposed scheme hides a digital secret message into two specified cadence. The or(More)
— There are some application areas where increasing concerns over personal information in computer system has increased interest in computer security. Increasing access to the internet and information resources has a great impact in our everyday life and in making people more dependent on computer systems and networks. This dependency has brought many(More)
Verifiable Secret Sharing Schemes (VSSS) allow the participants to verify their shares as consistent. Verifiable Secret Sharing provides the verifiability of the received shares to the participants. Most of these schemes require additional computation in the form of certificate vectors or error correction codes. This paper presents a threshold verifiable(More)