Results 41 to 50 of about 44,002 (291)

Secure Algorithms for SAKA Protocol in the GSM Network [PDF]

open access: yes, 2017
This paper deals with the security vulnerabilities of the cryptographic algorithms A3, A8, and A5 existing in the GSM network. We review these algorithms and propose new secure algorithms named NewA3, NewA8, and NewA5 algorithms with respect to the A3 ...
Chaudhari, N.S., Saxena, N.
core   +1 more source

A Comparative Study of Cerebral Oxygenation During Exercise in Hemodialysis and Peritoneal Dialysis Patients

open access: yesTherapeutic Apheresis and Dialysis, EarlyView.
ABSTRACT Introduction Cognitive impairment and exercise intolerance are common in dialysis patients. Cerebral perfusion and oxygenation play a major role in both cognitive function and exercise execution; HD session per se aggravates cerebral ischemia in this population. This study aimed to compare cerebral oxygenation and perfusion at rest and in mild
Marieta P. Theodorakopoulou   +10 more
wiley   +1 more source

Designing a Block Cipher in Galois Extension Fields for IoT Security

open access: yesIoT, 2021
This paper focuses on a block cipher adaptation of the Galois Extension Fields (GEF) combination technique for PRNGs and targets application in the Internet of Things (IoT) space, an area where the combination technique was concluded as a quality stream ...
Kiernan George, Alan J. Michaels
doaj   +1 more source

On the Design of Perceptual MPEG-Video Encryption Algorithms [PDF]

open access: yes, 2006
In this paper, some existing perceptual encryption algorithms of MPEG videos are reviewed and some problems, especially security defects of two recently proposed MPEG-video perceptual encryption schemes, are pointed out.
Bhargava, Bharat   +4 more
core   +6 more sources

Enteropathogenic E. coli shows delayed attachment and host response in human jejunum organoid‐derived monolayers compared to HeLa cells

open access: yesFEBS Letters, EarlyView.
Enteropathogenic E. coli (EPEC) infects the human intestinal epithelium, resulting in severe illness and diarrhoea. In this study, we compared the infection of cancer‐derived cell lines with human organoid‐derived models of the small intestine. We observed a delayed in attachment, inflammation and cell death on primary cells, indicating that host ...
Mastura Neyazi   +5 more
wiley   +1 more source

A Review of Block Ciphers and Its Post-Quantum Considerations

open access: yesIEEE Access
Recent advances in cryptography aim to address threats posed by quantum computers. However, these advances have focused disproportionately on asymmetric schemes, while symmetric primitives like block ciphers have received less attention.
R. V. Chethana   +3 more
doaj   +1 more source

BRISK: Dynamic Encryption Based Cipher for Long Term Security

open access: yesSensors, 2021
Several emerging areas like the Internet of Things, sensor networks, healthcare and distributed networks feature resource-constrained devices that share secure and privacy-preserving data to accomplish some goal.
Ashutosh Dhar Dwivedi
doaj   +1 more source

Plasmodium falciparum gametogenesis essential protein 1 (GEP1) is a transmission‐blocking target

open access: yesFEBS Letters, EarlyView.
This study shows Plasmodium falciparum GEP1 is vital for activating sexual stages of malarial parasites even independently of a mosquito factor. Knockout parasites completely fail gamete formation even when a phosphodiesterase inhibitor is added. Two single‐nucleotide polymorphisms (V241L and S263P) are found in 12%–20% of field samples.
Frederik Huppertz   +5 more
wiley   +1 more source

Single Key Variant of PMAC_Plus

open access: yesIACR Transactions on Symmetric Cryptology, 2017
At CRYPTO 2011, Yasuda proposed the PMAC_Plus message authentication code based on an n-bit block cipher. Its design principle inherits the well known PMAC parallel network with a low additional cost.
Nilanjan Datta   +4 more
doaj   +1 more source

Encryption Efficiency Analysis and Security Evaluation of RC6 Block Cipher for Digital Images

open access: yes, 2007
This paper investigates the encryption efficiency of RC6 block cipher application to digital images, providing a new mathematical measure for encryption efficiency, which we will call the encryption quality instead of visual inspection, The encryption ...
Ahmed, Hossam El-din Hussien   +6 more
core   +1 more source

Home - About - Disclaimer - Privacy