Results 31 to 40 of about 62,040 (316)

Serial encryption using the functions of real variable

open access: yesРадіоелектронні і комп'ютерні системи, 2021
Context. Using the functions of a real variable in cryptosystems as keys allow increasing their cryptographic strength since it is more difficult to select such keys. Therefore, the development of such systems is relevant. Objective.
Viktor Avramenko, Volodymyr Demianenko
doaj   +1 more source

Development of a Modified Medical Data Transmission over the Cellular Network System to Secure Health-Related Data from Changes in Environmental Parameters

open access: yesEngineering Proceedings
Patients are generally sent to hospitals during emergencies and life-threatening conditions using ambulances. The health problems of patients become more serious when the treatment is delayed.
Krishnaveni Kommuri   +1 more
doaj   +1 more source

A Simple, Accurate and Highly Secure Method to Encrypt-Decrypt Digital Images

open access: yesJOIV: International Journal on Informatics Visualization, 2019
The digital image may be important and has a secret character, which requires not understanding it when looking at the naked eye or not understanding the contents. So seeking a method of digital image encryption-decryption is a very important task.
Jamil Al-Azzeh, Ziad Alqadi, Qazem Jaber
doaj   +1 more source

6D-Chaotic System and 2D Fractional Discrete Cosine Transform Based Encryption of Biometric Templates

open access: yesIEEE Access, 2021
A new algorithm for biometric templates using a 6D-chaotic system, and 2D fractional discrete cosine transform (FrDCT) is proposed in this paper. In this technique, the $k$ biometric templates are represented into three groups.
Dhanesh Kumar   +9 more
doaj   +1 more source

Homomorphic Data Isolation for Hardware Trojan Protection

open access: yes, 2015
The interest in homomorphic encryption/decryption is increasing due to its excellent security properties and operating facilities. It allows operating on data without revealing its content.
Alanwar, Amr   +4 more
core   +1 more source

Decrypting SSL/TLS traffic for hidden threats detection

open access: yes, 2019
The paper presents an analysis of the main mechanisms of decryption of SSL/TLS traffic. Methods and technologies for detecting malicious activity in encrypted traffic that are used by leading companies are also considered.
Ageyev, Dmytro   +4 more
core   +1 more source

Decryption of tissue factor [PDF]

open access: yesThrombosis Research, 2012
Tissue factor (TF) is a transmembrane protein which, in complex with factor (F)VIIa, initiates blood coagulation. Numerous studies have determined TF epitopes and individual amino acids which play an important role in the TF/FVIIa complex formation and its activity towards natural substrates.
Saulius, Butenas, Jolanta, Krudysz-Amblo
openaire   +2 more sources

ROYALE: A Framework for Universally Composable Card Games with Financial Rewards and Penalties Enforcement [PDF]

open access: yes, 2019
While many tailor made card game protocols are known, the vast majority of those suffer from three main issues: lack of mechanisms for distributing financial rewards and punishing cheaters, lack of composability guarantees and little flexibility ...
A Barnett   +16 more
core   +2 more sources

Decrypting Aadhaar

open access: yes, 2021
The topic of Aadhaar links with the Indians in various ways. Aadhaar can be thought of as a digital infrastructure that has been an enabler and disabler in its ways. I exploresome of these ways through my article. I tried to question the proposition of introducing Aadhaar and carefully studied its theoretical bene?ts. Furthermore, I wish to explore the
openaire   +3 more sources

Spatiotemporal and quantitative analyses of phosphoinositides – fluorescent probe—and mass spectrometry‐based approaches

open access: yesFEBS Letters, EarlyView.
Fluorescent probes allow dynamic visualization of phosphoinositides in living cells (left), whereas mass spectrometry provides high‐sensitivity, isomer‐resolved quantitation (right). Their synergistic use captures complementary aspects of lipid signaling. This review illustrates how these approaches reveal the spatiotemporal regulation and quantitative
Hiroaki Kajiho   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy