Results 11 to 20 of about 2,693,059 (249)
Treatment planning with a 2.5 MV photon beam for radiation therapy
Abstract Purpose The shallow depth of maximum dose and higher dose fall‐off gradient of a 2.5 MV beam along the central axis that is available for imaging on linear accelerators is investigated for treatment of shallow tumors and sparing the organs at risk (OARs) beyond it.
Navid Khaledi+5 more
wiley +1 more source
A Review Paper on Network Security and Cryptography
Organizations all over the globe create a tremendous quantity of data on a daily basis since the birth of the World Wide Web and the rise of ecommerce apps and social networks.
Mr. Pradeep V+3 more
semanticscholar +1 more source
—Now-a-days, sensitive and confidential information needs to be exchanged over open, public, and not secure networks such as the Internet. For this purpose, some information security techniques combine cryptographic and steganographic algorithms and ...
E. G., Holman Montiel A, F. S.
semanticscholar +1 more source
—Ensuring the security of cloud computing is one of the most critical challenges facing the cloud services sector. Dealing with data in a cloud environment, which uses shared resources, and providing reliable and secure cloud services, requires a robust ...
Hossein Abroshan
semanticscholar +1 more source
A Survey on Blockchain Technology Concepts, Applications and Security
—In the past decade, blockchain technology has become increasingly prevalent in our daily lives. This technology consists of a chain of blocks that contains the history of transactions and information about its users. Distributed digital ledgers are used
Asma M. Alqahtani, Abdulmohsen Algarni
semanticscholar +1 more source
Gaming security by obscurity [PDF]
Shannon sought security against the attacker with unlimited computational powers: *if an information source conveys some information, then Shannon's attacker will surely extract that information*.
Pavlovic, Dusko
core +5 more sources
Security Impact Analysis of Degree of Field Extension in Lattice Attacks on Ring-LWE Problem
Modern information communications use cryptography to keep the contents of communications confidential. RSA (Rivest-Shamir-Adleman) cryptography and elliptic curve cryptography, which are public-key cryptosystems, are widely used cryptographic schemes ...
Direbieski, Yuri Lucas+5 more
core +1 more source
Design and Evaluation to Calculate the Performance of Hybrid Cryptography to make Secure Transaction over Network [PDF]
Nowadays, the use of internet are growing increasingly across the world, security becomes a prime concern of issue for the society. Earlier security was a major issue for military applications but now the area of applications has been enhanced since most
et.al, Anup Bhange,
core +2 more sources
Solving discrete logarithms on a 170-bit MNT curve by pairing reduction [PDF]
Pairing based cryptography is in a dangerous position following the breakthroughs on discrete logarithms computations in finite fields of small characteristic.
A Commeine+33 more
core +5 more sources
Using Process Models to understand Security Standards [PDF]
Many industrial software development processes today have to comply with security standards such as the IEC~62443-4-1. These standards, written in natural language, are ambiguous and complex to understand. This is especially true for non-security experts.
arxiv +1 more source