Results 291 to 300 of about 58,616 (313)
Some of the next articles are maybe not open access.

Onychocryptosis – decrypting the controversies

International Journal of Dermatology, 2020
AbstractOnychocryptosis, or ingrown toenail, is a frequent, painful condition affecting young individuals. Controversies still exist regarding its etiopathogenesis and treatment options, including conservative and surgical techniques. The choice of treatment method depends on the stage of disease as conservative measures are mostly effective in early ...
Keshavamurthy Vinay   +3 more
openaire   +2 more sources

Decrypting C2 inhibitors

Blood, 2014
In this issue of Blood, Nguyen et al employ high-resolution mapping to precisely define epitopes on the C2 domain of blood coagulation factor VIII (FVIII).1 Their results nicely complement a recent report in Blood describing the structure of a ternary complex of 2 inhibitory antibodies with the C2 domain.2 Together, these studies reveal fascinating ...
Jan Voorberg, Henriet Meems
openaire   +3 more sources

Mathematical optimization of decrypting algorithm for soft input decryption

2009 XXII International Symposium on Information, Communication and Automation Technologies, 2009
In this work, the strategy for correction of bits using Soft Input Decryption is analyzed. Soft Input Decryption is used for correction of cryptographic check values, which are very fragile when they are transmitted over noisy channels: only one wrong bit at input of the decryptor causes about 50% of errors at output of the decryptor.
Esad Kadusic, Natasa Zivic, Mirko Skrbic
openaire   +2 more sources

Pay as You Decrypt: Decryption Outsourcing for Functional Encryption Using Blockchain

IEEE Transactions on Information Forensics and Security, 2020
The concept of functional encryption (FE) has been introduced to address the shortcomings of public-key encryption (PKE) in many emerging applications which require both data storage and data sharing (e.g., cloud storage service). One of the major issues existing in most FE schemes is the efficiency, as they are built from bilinear pairings of which ...
Hui Cui   +4 more
openaire   +2 more sources

On the freedom of decryption

Information Processing Letters, 2003
Some formal methods for cryptographic protocol analysis represent message fields using a free term algebra, which does not permit an explicit symmetric decryption operator. Although the ability of principals and intruders to decrypt encrypted messages is represented implicitly, such models can fail to recognize some attacks. However, with an additional
openaire   +2 more sources

802.11 "decrypted"

ACM SIGCOMM Computer Communication Review, 2005
This short paper introduces wireless IEEE 802 standards and activities with a focus on explaining the purpose of the many 802.11 amendments.
openaire   +2 more sources

Optical Encryption and Decryption

2019
The application of artificial light to carry information, that is, to transmit signals over longer distances, dates from the use of fire to send messages. In the 1880s, Bell demonstrated his system for transmitting speech using a modulated beam of light.
John T. Sheridan, Inbarasan Muniraj
openaire   +2 more sources

Decrypting a brain enigma

Nature, 2015
The combined neuronal activity of two seemingly opposite types of Purkinje cell in the brain's cerebellum has been found to be required to control the jerky eye movements known as saccades in monkeys. See Letter p.439 The Purkinje cells are inhibitory neurons in the cerebellum with a central role in
openaire   +3 more sources

FSPAlgorithm for encryption/decryption

2008 International Conference on Computing, Communication and Networking, 2008
Cryptography is one of the most important areas in the computer industry. Encryption allows an application to secure its data from being accessed by hackers. This paper developed and designed an algorithm for encryption and decryption. Cryptography provides many methods and techniques for secure communication. Currently there are many industry standard
R. M. Chandrasekaran, V. Kalaichelvi
openaire   +2 more sources

ENCRYPTION-DECRYPTION TECHNIQUES FOR PICTURES

International Journal of Pattern Recognition and Artificial Intelligence, 1989
Language theoretic public key cryptosystems for strings and pictures are discussed. Two methods of constructing public key cryptosystems for the safe transmission or storage of chain code pictures are presented; the first one encrypts a chain code picture as a string and the second one as a two-dimensional array.
Rani Siromoney   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy