Results 61 to 70 of about 1,726,359 (308)
Perancangan Program Aplikasi Kriptografi Menggunakan Algoritma Magenta dengan Panjang Kunci 128 Bit
Along with the development of computer technology, the growing crimes against the computer. Crimes against the computer makes people increasingly competing to make the algorithms-algorithms that can maintain the confidentiality of data.
Steffie Hugh Wibisono, Djunaidy Santoso
doaj +1 more source
Efficient physical layer key generation technique in wireless communications
Wireless communications between two devices can be protected by secret keys. However, existing key generation schemes suffer from the high bit disagreement rate and low bit generation rate.
Rushan Lin, Li Xu, He Fang, Chuan Huang
doaj +1 more source
Composable security for practical quantum key distribution with two way classical communication
We present a theory for the composable security of sending-or-not-sending (SNS) protocol of twin field quantum key distribution (TF-QKD). We present methods to strictly calculate the finite-key effects in QKD with error rejection through two-way ...
Cong Jiang +3 more
doaj +1 more source
Simulation of position sensitivity of the anomalous Hall effect on a single magnetic dot [PDF]
To overcome the superparamagnetic effect caused by scaling bit and grain sizes in magnetic storage media different approaches are investigated. One alternative is bit patterned magnetic media (BPM) where each bit is represented by a single domain ...
Abelmann, Leon +7 more
core +1 more source
Multiple ETS family transcription factors bind mutant p53 via distinct interaction regions
Mutant p53 gain‐of‐function is thought to be mediated by interaction with other transcription factors. We identify multiple ETS transcription factors that can bind mutant p53 and found that this interaction can be promoted by a PXXPP motif. ETS proteins that strongly bound mutant p53 were upregulated in ovarian cancer compared to ETS proteins that ...
Stephanie A. Metcalf +6 more
wiley +1 more source
PERBANDINGAN APLIKASI MENGGUNAKAN METODE CAMELLIA 128 BIT KEY DAN 256 BIT KEY
The rapid development of the Internet today to easily exchange data. This leads to high levels of risk in the data piracy. One of the ways to secure data is using cryptography camellia. Camellia is known as a method that has the encryption and decryption
Lanny Sutanto +2 more
doaj
Unconditional Security of Single-Photon Differential Phase Shift Quantum Key Distribution
In this Letter, we prove the unconditional security of single-photon differential phase shift quantum key distribution (DPS-QKD) protocol, based on the conversion to an equivalent entanglement-based protocol.
C. H. Bennett +7 more
core +1 more source
At low cell density, SETDB1 and YAP1 accumulate in the nucleus. As cell density increases, the Hippo pathway is gradually activated, and SETDB1 is associated with increased YAP1 phosphorylation. At high cell density, phosphorylated YAP1 is sequestered in the cytoplasm, while SETDB1 becomes polyubiquitinated and degraded by the ubiquitin–proteasome ...
Jaemin Eom +3 more
wiley +1 more source
Enhanced Performance of Perovskite Solar Cells via Multifunctional Carbon Quantum Dot Modification
Numerous defects on the surface of halide perovskite films considerably limit the photovoltaic efficacy of perovskite solar cells (PSCs). Herein, multifunctional carbon quantum dots (CQDs) were introduced to modify the perovskite film surface.
Jing Liu +12 more
doaj +1 more source
This study explores salivary RNA for breast cancer (BC) diagnosis, prognosis, and follow‐up. High‐throughput RNA sequencing identified distinct salivary RNA signatures, including novel transcripts, that differentiate BC from healthy controls, characterize histological and molecular subtypes, and indicate lymph node involvement.
Nicholas Rajan +9 more
wiley +1 more source

