Results 41 to 50 of about 755,843 (383)
CacheZoom: How SGX Amplifies The Power of Cache Attacks [PDF]
In modern computing environments, hardware resources are commonly shared, and parallel computation is widely used. Parallel tasks can cause privacy and security problems if proper isolation is not enforced.
D Brumley +16 more
core +2 more sources
Incidence and time course of everolimus-related adverse events in postmenopausal women with hormone receptor-positive advanced breast cancer: insights from BOLERO-2. [PDF]
BackgroundIn the BOLERO-2 trial, everolimus (EVE), an inhibitor of mammalian target of rapamycin, demonstrated significant clinical benefit with an acceptable safety profile when administered with exemestane (EXE) in postmenopausal women with hormone ...
Baselga, J +18 more
core +1 more source
High Speed Area Efficient FPGA Implementation of AES Algorithm
Now a day digital information is very easy to process, but it allows unauthorized users to access this information. To protect this information from unauthorized access, Advanced Encryption Standard (AES) is one of the most frequently used symmetric key ...
P. Mane, A. Mulani
semanticscholar +1 more source
AES-128 Based Secure Low Power Communication for LoRaWAN IoT Environments
Currently, Internet of Things (IoT) as an essential infrastructure proposed for industries and different applications has been popularly applied to different domains, such as healthcare and smart farming, for helping people to do something, aiming to ...
K. Tsai +5 more
semanticscholar +1 more source
DES22: DES BASED ALGORITHM WITH IMPROVED SECURITY
We live in a world where the Internet has become the backbone of most of our dealings. The Internet has turned this big planet into a small village. The internet can be reached by everyone, everywhere, and anytime. Some authors predict that the number of
Malek M. Barhoush +4 more
doaj +1 more source
An Efficient Side-Channel Protected AES Implementation with Arbitrary Protection Order
Passive physical attacks, like power analysis, pose a serious threat to the security of digital circuits. In this work, we introduce an efficient side-channel protected Advanced Encryption Standard (AES) hardware design that is completely scalable in ...
Hannes Gross, S. Mangard, Thomas Korak
semanticscholar +1 more source
Silicon recovery from silicon-iron alloys by electrorefining in molten fluorides [PDF]
Electrorefining of a silicon-iron material (Si-4.7at%Fe) in molten NaF-KF at 850°C has been investigated in view of recovering pure Si, using electrochemical techniques, SEM-EDS and ICP-AES analyses.
Bieber, Anne-Laure +5 more
core +4 more sources
AE 941 [Arthrovas, Neoretna, Psovascar] is shark cartilage extract that inhibits angiogenesis. AE 941 acts by blocking the two main pathways that contribute to the process of angiogenesis, matrix metalloproteases and the vascular endothelial growth factor signalling pathway.
openaire +2 more sources
A Cyber Security Approach Using Multilayer Cryptographic System
The cybersecurity is one of the important challenges facing the digital world to protect data over the Internet, where encryption technologies are used for this purpose.
Kamaran Adil Ibrahim +4 more
doaj +1 more source
Reconfiurable multi-launch pipeline processing architecture for block cipher
With the wide application of reconfigurable design technology in the field of cryptography, the existing reconfigurable cryptography system can hardly meet the needs of high-speed communication and equipment miniaturization.Therefore, it is the goal of ...
Xue Yuqian, Dai Zibin
doaj +1 more source

