Results 21 to 30 of about 2,704,498 (247)

Internet of things based hybrid cryptography for process data security

open access: yesJournal of Mathematics and Computer Science, 2020
This manuscript addresses security issues, security mechanisms of Internet of Things (IoT) and implementation of hybrid cryptography for preserving the process information against unauthorized access and modification.
J. S. Prasath   +3 more
semanticscholar   +1 more source

DNA Encoded Elliptic Curve Cryptography System for IoT Security

open access: yes, 2023
In the field of Computer Science and Information Technology Internet of Things (IoT) is one of the emerging technologies. In IoT environment several devices are interconnected and transmit data among them.
Barmana, Prokash, Saha, Banani
core  

Proceedings 11th Doctoral Workshop on Mathematical and Engineering Methods in Computer Science [PDF]

open access: yesEPTCS 233, 2016, 2016
MEMICS provides a forum for doctoral students interested in applications of mathematical and engineering methods in computer science. Besides a rich technical programme (including invited talks, regular papers, and presentations), MEMICS also offers friendly social activities and exciting opportunities for meeting like-minded people. MEMICS submissions
arxiv   +1 more source

Ubic: Bridging the gap between digital cryptography and the physical world

open access: yes, 2014
Advances in computing technology increasingly blur the boundary between the digital domain and the physical world. Although the research community has developed a large number of cryptographic primitives and has demonstrated their usability in all ...
D.M. Freeman   +6 more
core   +1 more source

On (Subgame Perfect) Secure Equilibrium in Quantitative Reachability Games [PDF]

open access: yesLogical Methods in Computer Science, Volume 9, Issue 1 (February 28, 2013) lmcs:790, 2012
We study turn-based quantitative multiplayer non zero-sum games played on finite graphs with reachability objectives. In such games, each player aims at reaching his own goal set of states as soon as possible. A previous work on this model showed that Nash equilibria (resp. secure equilibria) are guaranteed to exist in the multiplayer (resp. two-player)
arxiv   +1 more source

Analysis of the Security of BB84 by Model Checking [PDF]

open access: yes, 2010
Quantum Cryptography or Quantum key distribution (QKD) is a technique that allows the secure distribution of a bit string, used as key in cryptographic protocols.
Azizi, Abdelmalek   +2 more
core   +2 more sources

Privacy aware novel lightweight cryptography mechanism for IoT security

open access: yesIndonesian Journal of Electrical Engineering and Computer Science
The rapid development of communication technology through internet of things (IoT), the IoT devices is required for data analysis and utilization of collection of data through an object for various devices in a different manner. In this paper, a reliable
Rashmi H. Chamarajappa   +1 more
semanticscholar   +1 more source

The power of microRNA regulation—insights into immunity and metabolism

open access: yesFEBS Letters, EarlyView.
MicroRNAs are emerging as crucial regulators at the intersection of metabolism and immunity. This review examines how miRNAs coordinate glucose and lipid metabolism while simultaneously modulating T‐cell development and immune responses. Moreover, it highlights how cutting‐edge artificial intelligence applications can identify miRNA biomarkers ...
Stefania Oliveto   +2 more
wiley   +1 more source

Message Security in Classical Cryptography Using the Vigenere Cipher Method

open access: yesInternational Journal Software Engineering and Computer Science (IJSECS)
Ensuring message confidentiality is a fundamental aspect of classical cryptography. This study uses the Vigenere Cipher, a prominent polyalphabetic substitution technique, to secure alphabetic text.
Purwanti   +2 more
semanticscholar   +1 more source

The Saccharomyces cerevisiae amino acid transporter Lyp1 has a broad substrate spectrum

open access: yesFEBS Letters, EarlyView.
In Saccharomyces cerevisiae, Yeast Amino acid Transporter family members mediate the import of amino acids, ranging from substrate specialists to generalists. Here, we show that the specialist transporter, Lyp1, has a broader substrate spectrum than previously described, with affinity constants spanning from micromolar to millimolar.
Foteini Karapanagioti   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy