Internet of things based hybrid cryptography for process data security
This manuscript addresses security issues, security mechanisms of Internet of Things (IoT) and implementation of hybrid cryptography for preserving the process information against unauthorized access and modification.
J. S. Prasath+3 more
semanticscholar +1 more source
DNA Encoded Elliptic Curve Cryptography System for IoT Security
In the field of Computer Science and Information Technology Internet of Things (IoT) is one of the emerging technologies. In IoT environment several devices are interconnected and transmit data among them.
Barmana, Prokash, Saha, Banani
core
Proceedings 11th Doctoral Workshop on Mathematical and Engineering Methods in Computer Science [PDF]
MEMICS provides a forum for doctoral students interested in applications of mathematical and engineering methods in computer science. Besides a rich technical programme (including invited talks, regular papers, and presentations), MEMICS also offers friendly social activities and exciting opportunities for meeting like-minded people. MEMICS submissions
arxiv +1 more source
Ubic: Bridging the gap between digital cryptography and the physical world
Advances in computing technology increasingly blur the boundary between the digital domain and the physical world. Although the research community has developed a large number of cryptographic primitives and has demonstrated their usability in all ...
D.M. Freeman+6 more
core +1 more source
On (Subgame Perfect) Secure Equilibrium in Quantitative Reachability Games [PDF]
We study turn-based quantitative multiplayer non zero-sum games played on finite graphs with reachability objectives. In such games, each player aims at reaching his own goal set of states as soon as possible. A previous work on this model showed that Nash equilibria (resp. secure equilibria) are guaranteed to exist in the multiplayer (resp. two-player)
arxiv +1 more source
Analysis of the Security of BB84 by Model Checking [PDF]
Quantum Cryptography or Quantum key distribution (QKD) is a technique that allows the secure distribution of a bit string, used as key in cryptographic protocols.
Azizi, Abdelmalek+2 more
core +2 more sources
Privacy aware novel lightweight cryptography mechanism for IoT security
The rapid development of communication technology through internet of things (IoT), the IoT devices is required for data analysis and utilization of collection of data through an object for various devices in a different manner. In this paper, a reliable
Rashmi H. Chamarajappa+1 more
semanticscholar +1 more source
The power of microRNA regulation—insights into immunity and metabolism
MicroRNAs are emerging as crucial regulators at the intersection of metabolism and immunity. This review examines how miRNAs coordinate glucose and lipid metabolism while simultaneously modulating T‐cell development and immune responses. Moreover, it highlights how cutting‐edge artificial intelligence applications can identify miRNA biomarkers ...
Stefania Oliveto+2 more
wiley +1 more source
Message Security in Classical Cryptography Using the Vigenere Cipher Method
Ensuring message confidentiality is a fundamental aspect of classical cryptography. This study uses the Vigenere Cipher, a prominent polyalphabetic substitution technique, to secure alphabetic text.
Purwanti+2 more
semanticscholar +1 more source
The Saccharomyces cerevisiae amino acid transporter Lyp1 has a broad substrate spectrum
In Saccharomyces cerevisiae, Yeast Amino acid Transporter family members mediate the import of amino acids, ranging from substrate specialists to generalists. Here, we show that the specialist transporter, Lyp1, has a broader substrate spectrum than previously described, with affinity constants spanning from micromolar to millimolar.
Foteini Karapanagioti+3 more
wiley +1 more source