Results 81 to 90 of about 29,404 (289)
Flexible Session Management in a Distributed Environment
Many secure communication libraries used by distributed systems, such as SSL, TLS, and Kerberos, fail to make a clear distinction between the authentication, session, and communication layers.
+17 more
core +2 more sources
Aldehyde dehydrogenase 1A1 (ALDH1A1) is a cancer stem cell marker in several malignancies. We established a novel epithelial cell line from rectal adenocarcinoma with unique overexpression of this enzyme. Genetic attenuation of ALDH1A1 led to increased invasive capacity and metastatic potential, the inhibition of proliferation activity, and ultimately ...
Martina Poturnajova +25 more
wiley +1 more source
Constructing Committing and Leakage-Resilient Authenticated Encryption
The main goal of this work is to construct authenticated encryption (AE) hat is both committing and leakage-resilient. As a first approach for this we consider generic composition as a well-known method for constructing AE schemes.
Patrick Struck, Maximiliane Weishäupl
doaj +1 more source
We present the family of authenticated encryption schemes SKINNY-AEAD and the family of hashing schemes SKINNY-Hash. All of the schemes employ a member of the SKINNY family of tweakable block ciphers, which was presented at CRYPTO 2016, as the underlying
Christof Beierle +8 more
doaj +1 more source
Building Secure and Anonymous Communication Channel: Formal Model and its Prototype Implementation [PDF]
Various techniques need to be combined to realize anonymously authenticated communication. Cryptographic tools enable anonymous user authentication while anonymous communication protocols hide users' IP addresses from service providers.
Emura, Keita +3 more
core
Automatic Intent-Based Secure Service Creation Through a Multilayer SDN Network Orchestration
Growing traffic demands and increasing security awareness are driving the need for secure services. Current solutions require manual configuration and deployment based on the customer's requirements.
Autenrieth, Achim +7 more
core +1 more source
Biometric-Authenticated Searchable Encryption
We introduce Biometric-Authenticated Keyword Search (BAKS), a novel searchable encryption scheme that relieves clients from managing cryptographic keys and relies purely on client’s biometric data for authenticated outsourcing and retrieval of files indexed by encrypted keywords.
Daniel Gardham +2 more
openaire +2 more sources
Encrypted Oligonucleotide Arrays for Molecular Authentication
Counterfeiting is an incredibly widespread problem, with some estimates placing its economic impact above 2% of worldwide GDP. The scale of the issue suggests that current preventive measures are either technologically insufficient or too impractical and costly to be widely adopted.
Matthew T. Holden, Lloyd M. Smith
openaire +3 more sources
Tumors contain diverse cellular states whose behavior is shaped by context‐dependent gene coordination. By comparing gene–gene relationships across biological contexts, we identify adaptive transcriptional modules that reorganize into distinct vulnerability axes.
Brian Nelson +9 more
wiley +1 more source
We revisit the notion of deniability in quantum key exchange (QKE), a topic that remains largely unexplored. In the only work on this subject by Donald Beaver, it is argued that QKE is not necessarily deniable due to an eavesdropping attack that limits ...
A Steane +24 more
core +1 more source

