Results 81 to 90 of about 29,404 (289)

Flexible Session Management in a Distributed Environment

open access: yes, 2010
Many secure communication libraries used by distributed systems, such as SSL, TLS, and Kerberos, fail to make a clear distinction between the authentication, session, and communication layers.
  +17 more
core   +2 more sources

Genetic attenuation of ALDH1A1 increases metastatic potential and aggressiveness in colorectal cancer

open access: yesMolecular Oncology, EarlyView.
Aldehyde dehydrogenase 1A1 (ALDH1A1) is a cancer stem cell marker in several malignancies. We established a novel epithelial cell line from rectal adenocarcinoma with unique overexpression of this enzyme. Genetic attenuation of ALDH1A1 led to increased invasive capacity and metastatic potential, the inhibition of proliferation activity, and ultimately ...
Martina Poturnajova   +25 more
wiley   +1 more source

Constructing Committing and Leakage-Resilient Authenticated Encryption

open access: yesIACR Transactions on Symmetric Cryptology
The main goal of this work is to construct authenticated encryption (AE) hat is both committing and leakage-resilient. As a first approach for this we consider generic composition as a well-known method for constructing AE schemes.
Patrick Struck, Maximiliane Weishäupl
doaj   +1 more source

SKINNY-AEAD and SKINNY-Hash

open access: yesIACR Transactions on Symmetric Cryptology, 2020
We present the family of authenticated encryption schemes SKINNY-AEAD and the family of hashing schemes SKINNY-Hash. All of the schemes employ a member of the SKINNY family of tweakable block ciphers, which was presented at CRYPTO 2016, as the underlying
Christof Beierle   +8 more
doaj   +1 more source

Building Secure and Anonymous Communication Channel: Formal Model and its Prototype Implementation [PDF]

open access: yes, 2014
Various techniques need to be combined to realize anonymously authenticated communication. Cryptographic tools enable anonymous user authentication while anonymous communication protocols hide users' IP addresses from service providers.
Emura, Keita   +3 more
core  

Automatic Intent-Based Secure Service Creation Through a Multilayer SDN Network Orchestration

open access: yes, 2018
Growing traffic demands and increasing security awareness are driving the need for secure services. Current solutions require manual configuration and deployment based on the customer's requirements.
Autenrieth, Achim   +7 more
core   +1 more source

Biometric-Authenticated Searchable Encryption

open access: yes, 2020
We introduce Biometric-Authenticated Keyword Search (BAKS), a novel searchable encryption scheme that relieves clients from managing cryptographic keys and relies purely on client’s biometric data for authenticated outsourcing and retrieval of files indexed by encrypted keywords.
Daniel Gardham   +2 more
openaire   +2 more sources

Encrypted Oligonucleotide Arrays for Molecular Authentication

open access: yesACS Combinatorial Science, 2019
Counterfeiting is an incredibly widespread problem, with some estimates placing its economic impact above 2% of worldwide GDP. The scale of the issue suggests that current preventive measures are either technologically insufficient or too impractical and costly to be widely adopted.
Matthew T. Holden, Lloyd M. Smith
openaire   +3 more sources

Network divergence analysis identifies adaptive gene modules and two orthogonal vulnerability axes in pancreatic cancer

open access: yesMolecular Oncology, EarlyView.
Tumors contain diverse cellular states whose behavior is shaped by context‐dependent gene coordination. By comparing gene–gene relationships across biological contexts, we identify adaptive transcriptional modules that reorganize into distinct vulnerability axes.
Brian Nelson   +9 more
wiley   +1 more source

Revisiting Deniability in Quantum Key Exchange via Covert Communication and Entanglement Distillation

open access: yes, 2018
We revisit the notion of deniability in quantum key exchange (QKE), a topic that remains largely unexplored. In the only work on this subject by Donald Beaver, it is argued that QKE is not necessarily deniable due to an eavesdropping attack that limits ...
A Steane   +24 more
core   +1 more source

Home - About - Disclaimer - Privacy