Results 31 to 40 of about 717,304 (368)

High Speed Area Efficient FPGA Implementation of AES Algorithm

open access: yesInternational Journal of Reconfigurable and Embedded Systems (IJRES), 2018
Now a day digital information is very easy to process, but it allows unauthorized users to access this information. To protect this information from unauthorized access, Advanced Encryption Standard (AES) is one of the most frequently used symmetric key ...
P. Mane, A. Mulani, Articles Info
semanticscholar   +1 more source

Combination and comparison of AES and RC4 cryptography in least significant bit (LSB) method in digital image to improve message security

open access: yesJurnal Informatika, 2018
Message security is something that must be kept secretly. However, to maintain the security and the secret of a message it takes two different methods. To maintain the security of messages, the science that has been widely used is to use cryptography. As
Rahmat Sulaiman
doaj   +1 more source

DES22: DES BASED ALGORITHM WITH IMPROVED SECURITY

open access: yesJordanian Journal of Computers and Information Technology, 2022
We live in a world where the Internet has become the backbone of most of our dealings. The Internet has turned this big planet into a small village. The internet can be reached by everyone, everywhere, and anytime. Some authors predict that the number of
Malek M. Barhoush   +4 more
doaj   +1 more source

AES-128 Based Secure Low Power Communication for LoRaWAN IoT Environments

open access: yesIEEE Access, 2018
Currently, Internet of Things (IoT) as an essential infrastructure proposed for industries and different applications has been popularly applied to different domains, such as healthcare and smart farming, for helping people to do something, aiming to ...
K. Tsai   +5 more
semanticscholar   +1 more source

Exploring the causes of adverse events in hospitals and potential prevention strategies [PDF]

open access: yes, 2010
Objectives To examine the causes of adverse events (AEs) and potential prevention strategies to minimise the occurrence of AEs in hospitalised patients.
Groenewegen, P.P.,   +6 more
core   +4 more sources

An Efficient Side-Channel Protected AES Implementation with Arbitrary Protection Order

open access: yesThe Cryptographer's Track at RSA Conference, 2017
Passive physical attacks, like power analysis, pose a serious threat to the security of digital circuits. In this work, we introduce an efficient side-channel protected Advanced Encryption Standard (AES) hardware design that is completely scalable in ...
Hannes Gross, S. Mangard, Thomas Korak
semanticscholar   +1 more source

Incidence and time course of everolimus-related adverse events in postmenopausal women with hormone receptor-positive advanced breast cancer: insights from BOLERO-2. [PDF]

open access: yes, 2014
BackgroundIn the BOLERO-2 trial, everolimus (EVE), an inhibitor of mammalian target of rapamycin, demonstrated significant clinical benefit with an acceptable safety profile when administered with exemestane (EXE) in postmenopausal women with hormone ...
Baselga, J   +18 more
core   +1 more source

AE 941

open access: yesDrugs in R & D, 2004
AE 941 [Arthrovas, Neoretna, Psovascar] is shark cartilage extract that inhibits angiogenesis. AE 941 acts by blocking the two main pathways that contribute to the process of angiogenesis, matrix metalloproteases and the vascular endothelial growth factor signalling pathway.
openaire   +2 more sources

Chromoelectric fields and quarkonium-hadron interactions at high energies

open access: yes, 2005
We develop a simple model to study the heavy quarkonium-hadron cross section in the high energy limit. The hadron is represented by an external electric color field (capacitor) and the heavy quarkonium is represented by a small color dipole.
D. A. Fogaça   +6 more
core   +1 more source

CacheZoom: How SGX Amplifies The Power of Cache Attacks [PDF]

open access: yes, 2017
In modern computing environments, hardware resources are commonly shared, and parallel computation is widely used. Parallel tasks can cause privacy and security problems if proper isolation is not enforced.
D Brumley   +16 more
core   +2 more sources

Home - About - Disclaimer - Privacy