Results 291 to 300 of about 58,616 (313)
Some of the next articles are maybe not open access.
Onychocryptosis – decrypting the controversies
International Journal of Dermatology, 2020AbstractOnychocryptosis, or ingrown toenail, is a frequent, painful condition affecting young individuals. Controversies still exist regarding its etiopathogenesis and treatment options, including conservative and surgical techniques. The choice of treatment method depends on the stage of disease as conservative measures are mostly effective in early ...
Keshavamurthy Vinay+3 more
openaire +2 more sources
Blood, 2014
In this issue of Blood, Nguyen et al employ high-resolution mapping to precisely define epitopes on the C2 domain of blood coagulation factor VIII (FVIII).1 Their results nicely complement a recent report in Blood describing the structure of a ternary complex of 2 inhibitory antibodies with the C2 domain.2 Together, these studies reveal fascinating ...
Jan Voorberg, Henriet Meems
openaire +3 more sources
In this issue of Blood, Nguyen et al employ high-resolution mapping to precisely define epitopes on the C2 domain of blood coagulation factor VIII (FVIII).1 Their results nicely complement a recent report in Blood describing the structure of a ternary complex of 2 inhibitory antibodies with the C2 domain.2 Together, these studies reveal fascinating ...
Jan Voorberg, Henriet Meems
openaire +3 more sources
Mathematical optimization of decrypting algorithm for soft input decryption
2009 XXII International Symposium on Information, Communication and Automation Technologies, 2009In this work, the strategy for correction of bits using Soft Input Decryption is analyzed. Soft Input Decryption is used for correction of cryptographic check values, which are very fragile when they are transmitted over noisy channels: only one wrong bit at input of the decryptor causes about 50% of errors at output of the decryptor.
Esad Kadusic, Natasa Zivic, Mirko Skrbic
openaire +2 more sources
Pay as You Decrypt: Decryption Outsourcing for Functional Encryption Using Blockchain
IEEE Transactions on Information Forensics and Security, 2020The concept of functional encryption (FE) has been introduced to address the shortcomings of public-key encryption (PKE) in many emerging applications which require both data storage and data sharing (e.g., cloud storage service). One of the major issues existing in most FE schemes is the efficiency, as they are built from bilinear pairings of which ...
Hui Cui+4 more
openaire +2 more sources
Information Processing Letters, 2003
Some formal methods for cryptographic protocol analysis represent message fields using a free term algebra, which does not permit an explicit symmetric decryption operator. Although the ability of principals and intruders to decrypt encrypted messages is represented implicitly, such models can fail to recognize some attacks. However, with an additional
openaire +2 more sources
Some formal methods for cryptographic protocol analysis represent message fields using a free term algebra, which does not permit an explicit symmetric decryption operator. Although the ability of principals and intruders to decrypt encrypted messages is represented implicitly, such models can fail to recognize some attacks. However, with an additional
openaire +2 more sources
ACM SIGCOMM Computer Communication Review, 2005
This short paper introduces wireless IEEE 802 standards and activities with a focus on explaining the purpose of the many 802.11 amendments.
openaire +2 more sources
This short paper introduces wireless IEEE 802 standards and activities with a focus on explaining the purpose of the many 802.11 amendments.
openaire +2 more sources
Optical Encryption and Decryption
2019The application of artificial light to carry information, that is, to transmit signals over longer distances, dates from the use of fire to send messages. In the 1880s, Bell demonstrated his system for transmitting speech using a modulated beam of light.
John T. Sheridan, Inbarasan Muniraj
openaire +2 more sources
Nature, 2015
The combined neuronal activity of two seemingly opposite types of Purkinje cell in the brain's cerebellum has been found to be required to control the jerky eye movements known as saccades in monkeys. See Letter p.439 The Purkinje cells are inhibitory neurons in the cerebellum with a central role in
openaire +3 more sources
The combined neuronal activity of two seemingly opposite types of Purkinje cell in the brain's cerebellum has been found to be required to control the jerky eye movements known as saccades in monkeys. See Letter p.439 The Purkinje cells are inhibitory neurons in the cerebellum with a central role in
openaire +3 more sources
FSPAlgorithm for encryption/decryption
2008 International Conference on Computing, Communication and Networking, 2008Cryptography is one of the most important areas in the computer industry. Encryption allows an application to secure its data from being accessed by hackers. This paper developed and designed an algorithm for encryption and decryption. Cryptography provides many methods and techniques for secure communication. Currently there are many industry standard
R. M. Chandrasekaran, V. Kalaichelvi
openaire +2 more sources
ENCRYPTION-DECRYPTION TECHNIQUES FOR PICTURES
International Journal of Pattern Recognition and Artificial Intelligence, 1989Language theoretic public key cryptosystems for strings and pictures are discussed. Two methods of constructing public key cryptosystems for the safe transmission or storage of chain code pictures are presented; the first one encrypts a chain code picture as a string and the second one as a two-dimensional array.
Rani Siromoney+2 more
openaire +2 more sources