Results 111 to 120 of about 39,375 (295)
A HYBRID ELLIPTIC CURVE AND DATA ENCRYPTION STANDARD ALGORITHM FOR SECURE DATA COMMUNICATION
n the rapidly evolving landscape of digital communication, ensuring data security remains a paramount concern. This research proposes a hybrid encryption technique that combines the strengths of Elliptic Curve Cryptography (ECC) and the Data Encryption ...
Samuel N. John +5 more
doaj
Decrypting the chaperone code [PDF]
Andrew W. Truman +2 more
openaire +2 more sources
xx xx. ABSTRACT Osseointegration of orthopedic and dental implants is influenced by local and systemic factors, including their physicochemical surface properties and the patient's overall health status. Titanium and its alloys have been a longstanding standard for bone implants due to their innate biocompatibility and mechanical properties.
Dainelys Guadarrama Bello +2 more
wiley +1 more source
Engineered microparticle topographies direct human mesenchymal stem cell osteogenesis without biochemical additives. This osteogenic commitment is driven by canonical Hedgehog signaling and followed by temporal IGF‐II engagement. Two‐photon polymerization demonstrates spatial control, enabling the engineering of topographical gradients that pattern ...
Fatmah I. Ghuloum +5 more
wiley +1 more source
Bioengineered 3D hPSC‐Cholangiocyte Ducts With Physiological Signals for Biliary Disease Modeling
Tian and colleagues generated a bioengineered bile duct from human pluripotent stem cell (hPSC)‐derived intrahepatic cholangiocytes within a high‐throughput, 384‐well platform to systematically examine the influence of biliary physiological signals including fluid flow, stromal cells and bile acids, and models intrahepatic biliary disease progression ...
Britney Tian +10 more
wiley +1 more source
With the advent of large-scale data applications, the security and efficiency of cryptographic systems have become two critical concerns. In this paper we present a cryptographic solution that combines the ChaCha20 encryption algorithm and SHA-256 ...
Azhar Sadiq Jafer, Huda Najeh Abbood
doaj +1 more source
Making Decryption Accountable [PDF]
Decryption is accountable if the users that create ciphertexts can gain information about the circumstances of the decryptions that are later obtained. We describe a protocol that forces decryptors to create such information. The information can’t be discarded or suppressed without detection. The protocol relies on a trusted hardware device.
openaire +1 more source
To dissect how mechanical forces influence intestinal physiology, we developed a stretchable 3D colon‐on‐chip that integrates tunable topography, stiffness and peristalsis‐like motion within a physiologically relevant microenvironment. We showed that stretching is a dominant factor governing epithelial behavior, markedly enhancing proliferation and ...
Moencopi Bernheim‐Dennery +10 more
wiley +1 more source
Bioinspired Adaptive Sensors: A Review on Current Developments in Theory and Application
This review comprehensively summarizes the recent progress in the design and fabrication of sensory‐adaptation‐inspired devices and highlights their valuable applications in electronic skin, wearable electronics, and machine vision. The existing challenges and future directions are addressed in aspects such as device performance optimization ...
Guodong Gong +12 more
wiley +1 more source
Security of Sensitive Data in Face Recognition System Applications: A Novel Encryption Approach
Background and Aim: The design of secure systems that can protect sensitive data is becoming a major area of research due to the growing number of applications that use the Internet.
S. Hemalatha +6 more
doaj +1 more source

