Results 101 to 110 of about 75,969 (261)

Design and Analysis of New Version of Cryptographic Hash Function Based on Improved Chaotic Maps With Induced DNA Sequences [PDF]

open access: gold, 2023
Salwa M. Serag Eldin   +7 more
openalex   +1 more source

Adaptive DNA Cryptography With Intelligent Machine Learning for Cloud Data Defense

open access: yesEngineering Reports, Volume 7, Issue 6, June 2025.
Algorithm 2 outlines the process of decrypting DNA‐encoded data retrieved from cloud storage. The DNA‐encoded fragments are first retrieved from the cloud and then concatenated to reconstruct the complete DNA‐encoded data. Subsequently, the DNA sequence is decoded back into encrypted digital data using the reverse of the defined encoding scheme ...
Animesh Kairi   +4 more
wiley   +1 more source

A perceptual hash function to store and retrieve large scale DNA sequences

open access: yes, 2014
This paper proposes a novel approach for storing and retrieving massive DNA sequences.. The method is based on a perceptual hash function, commonly used to determine the similarity between digital images, that we adapted for DNA sequences.
Bailly, Xavier   +3 more
core  

SHAREDWEALTH: A CRYPTOCURRENCY TO REWARD MINERS EVENLY [PDF]

open access: yes, 2015
Bitcoin [19] is a decentralized cryptocurrency that has recently gained popularity and has emerged as a popular medium of exchange. The total market capitalization is around 1.5 billion US dollars as of October 2013 [28].
Syed, Siddiq Ahmed
core   +1 more source

Formal Computational Unlinkability Proofs of RFID Protocols

open access: yes, 2017
We set up a framework for the formal proofs of RFID protocols in the computational model. We rely on the so-called computationally complete symbolic attacker model. Our contributions are: i) To design (and prove sound) axioms reflecting the properties of
Comon, Hubert, Koutsos, Adrien
core   +1 more source

Assessment of Practical Satellite Quantum Key Distribution Architectures for Current and Near‐Future Missions

open access: yesInternational Journal of Satellite Communications and Networking, Volume 43, Issue 3, Page 164-192, May/June 2025.
ABSTRACT Quantum key distribution (QKD) allows the generation of cryptographic keys beyond the computational hardness paradigm and is befitting for secure data transmission requiring long‐term security. The communication distance of fiber‐based QKD, however, is limited to a few hundred kilometers due to the exponential scaling of signal attenuation ...
Davide Orsucci   +7 more
wiley   +1 more source

Design keyed Hash function based on couple chaotic system

open access: yesTongxin xuebao, 2006
Analyzed the chaotic and cryptographic properties of a piecewise nonlinear map, a couple chaotic digital sys-tem was proposed based on perturbing which used the piecewise nonlinear, then a new approach to construct keyed Hash function was presented.
WEI Peng-cheng1   +3 more
doaj   +2 more sources

A Subject-Sensitive Perceptual Hash Based on MUM-Net for the Integrity Authentication of High Resolution Remote Sensing Images

open access: yesISPRS International Journal of Geo-Information, 2020
Data security technology is of great significance to the application of high resolution remote sensing image (HRRS) images. As an important data security technology, perceptual hash overcomes the shortcomings of cryptographic hashing that is not robust ...
Kaimeng Ding   +3 more
doaj   +1 more source

Can NSEC5 be practical for DNSSEC deployments? [PDF]

open access: yes, 2017
NSEC5 is proposed modification to DNSSEC that simultaneously guarantees two security properties: (1) privacy against offline zone enumeration, and (2) integrity of zone contents, even if an adversary compromises the authoritative nameserver responsible ...
Goldberg, Sharon   +6 more
core  

OpenSAFELY: The impact of COVID‐19 on azathioprine, leflunomide and methotrexate monitoring, and factors associated with change in monitoring rate

open access: yesBritish Journal of Clinical Pharmacology, Volume 91, Issue 6, Page 1586-1599, June 2025.
Aims The COVID‐19 pandemic created unprecedented pressure on healthcare services. This study investigates whether disease‐modifying antirheumatic drug (DMARD) safety monitoring was affected during the COVID‐19 pandemic. Methods A population‐based cohort study was conducted using the OpenSAFELY platform to access electronic health record data from 24.2 ...
Andrew D. Brown   +27 more
wiley   +1 more source

Home - About - Disclaimer - Privacy