Results 111 to 120 of about 235,449 (333)
Trusted Certificates in Quantum Cryptography [PDF]
This paper analyzes the performance of Kak's three stage quantum cryptographic protocol based on public key cryptography against a man-in-the-middle attack. A method for protecting against such an attack is presented using certificates distributed by a trusted third party.
arxiv
Advanced cryptographic techniques for computer [PDF]
Dennie Van Tassel
openalex +1 more source
Large multidimensional digital images of cancer tissue are becoming prolific, but many challenges exist to automatically extract relevant information from them using computational tools. We describe publicly available resources that have been developed jointly by expert and non‐expert computational biologists working together during a virtual hackathon
Sandhya Prabhakaran+16 more
wiley +1 more source
Innovative field of cryptography: DNA cryptography [PDF]
DNA cryptography is a new instinctive cryptographic field emerged with the research of DNA computing, in which DNA is used as information shipper and the modern biological technology is used as accomplishment tool. The speculative study and implementation shows method to be efficient in computation, storage and transmission and it is very powerful ...
openaire +1 more source
Implementing the Three-Stage Quantum Cryptography Protocol [PDF]
We present simple implementations of Kak's three-stage quantum cryptography protocol. The case where the transformation is applied to more than one qubit at the same time is also considered.
arxiv
Analysis of ESR1 mutations in plasma cell‐free DNA (cfDNA) is highly important for the selection of treatment in patients with breast cancer. Using multiplex‐ddPCR and identical blood draws, we investigated whether circulating tumor cells (CTCs) and cfDNA provide similar or complementary information for ESR1 mutations.
Stavroula Smilkou+11 more
wiley +1 more source
Full Restoration of Visual Encrypted Color Images [PDF]
While strictly black and white images have been the basis for visual cryptography, there has been a lack of an easily implemented format for colour images. This paper establishes a simple, yet secure way of implementing visual cryptography with colour, assuming a binary data representation.
arxiv
An extension of the Shannon theory approach to cryptography [PDF]
Martin E. Hellman
openalex +1 more source
Targeted metabolomics reveals novel diagnostic biomarkers for colorectal cancer
This study employed targeted metabolomic profiling to identify 302 distinct metabolites present in platelet‐rich plasma (PRP), revealing aberrant metabolic profiles amongst individuals diagnosed with colorectal cancer (CRC). Compared to carcinoembryonic antigen (CEA) and cancer antigen 19‐9 (CA199), our metabolite panel showed improved sensitivity ...
Zuojian Hu+7 more
wiley +1 more source