Results 61 to 70 of about 963,035 (329)

Optical Bit-Plane-Based 3D-JST Cryptography Algorithm With Cascaded 2D-FrFT Encryption for Efficient and Secure HEVC Communication

open access: yesIEEE Access, 2021
The rapid growth of multimedia communication systems has expanded the High-Efficiency Video Coding (HEVC) security applications precipitously. Therefore, there is an urgent, elevated need to protect and secure the HEVC content during streaming and ...
Walid El-Shafai   +2 more
doaj   +1 more source

Characterizing Parental Concerns About Lasting Impacts of Treatment in Children With B‐Acute Lymphoblastic Leukemia

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background B‐acute lymphoblastic leukemia (B‐ALL) is the most common pediatric cancer, and while most children in high‐resource settings are cured, therapy carries risks for long‐term toxicities. Understanding parents’ concerns about these late effects is essential to guide anticipatory support and inform evolving therapeutic approaches ...
Kellee N. Parker   +7 more
wiley   +1 more source

A tight security reduction in the quantum random oracle model for code-based signature schemes [PDF]

open access: yes, 2017
Quantum secure signature schemes have a lot of attention recently, in particular because of the NIST call to standardize quantum safe cryptography. However, only few signature schemes can have concrete quantum security because of technical difficulties ...
Chailloux, André   +1 more
core   +1 more source

Information Theoretic Authentication and Secrecy Codes in the Splitting Model

open access: yes, 2011
In the splitting model, information theoretic authentication codes allow non-deterministic encoding, that is, several messages can be used to communicate a particular plaintext.
Huber, Michael
core   +1 more source

Efficient and Scalable FPGA-Oriented Design of QC-LDPC Bit-Flipping Decoders for Post-Quantum Cryptography

open access: yesIEEE Access, 2020
Considering code-based cryptography, quasi-cyclic low-density parity-check (QC-LDPC) codes are foreseen as one of the few solutions to design post-quantum cryptosystems.
Davide Zoni   +2 more
doaj   +1 more source

A Lossless-Recovery Secret Distribution Scheme Based on QR Codes

open access: yesEntropy, 2023
The visual cryptography scheme (VCS) distributes a secret to several images that can enhance the secure transmission of that secret. Quick response (QR) codes are widespread. VCS can be used to improve their secure transmission.
Jeng-Shyang Pan   +4 more
doaj   +1 more source

The Myth of Superiority of American Encryption Products [PDF]

open access: yes, 1998
Encryption software and hardware use sophisticated mathematical algorithms to encipher a message so that only the intended recipient may read it. Fearing that criminals and terrorists will use encryption to evade authorities, the United States now ...
Henry B. Wolfe
core  

Cloud Data Auditing Using Proofs of Retrievability

open access: yes, 2017
Cloud servers offer data outsourcing facility to their clients. A client outsources her data without having any copy at her end. Therefore, she needs a guarantee that her data are not modified by the server which may be malicious.
Ruj, Sushmita, Sengupta, Binanda
core   +1 more source

Predicting the Future Burden of Renal Replacement Therapy in Türkiye Using National Registry Data and Comparative Modeling Approaches

open access: yesTherapeutic Apheresis and Dialysis, EarlyView.
ABSTRACT Background Chronic kidney disease is a growing public health problem worldwide, and the number of patients requiring renal replacement therapy is steadily increasing. Türkiye has experienced a similar rise in both the incidence and prevalence of renal replacement therapy over the past decades; however, national‐level projections of future ...
Arzu Akgül   +2 more
wiley   +1 more source

Quantum Resistant Random Linear Code Based Public Key Encryption Scheme RLCE [PDF]

open access: yes, 2015
Lattice based encryption schemes and linear code based encryption schemes have received extensive attention in recent years since they have been considered as post-quantum candidate encryption schemes.
Wang, Yongge
core   +2 more sources

Home - About - Disclaimer - Privacy