Results 31 to 40 of about 60,215 (284)
This paper proposes an innovative fusion of encryption and compression techniques that optimizes data handling and security. The approach employs a layered non-encoding encryption-compression algorithm DQRc (Data in Quick Response Code) that attempts to ...
Pratham Mishra +4 more
doaj +1 more source
An RGB Image Cipher Using Chaotic Systems, 15-Puzzle Problem and DNA Computing
The application of confusion and diffusion processes on the three individual components of an RGB image is not secure and efficient, so this problem needs to be addressed.
Nadeem Iqbal +5 more
doaj +1 more source
A Compartive Study Between (AES) and (DES) Algorithms Based on the (SET) Protocol [PDF]
Secure Electronic Transaction protocol is a very large protocol in securing electronic bargains in business online for the sake of privacy. The Data Encryption Standard (DES) cons are that it is slow and short key (56 Bits).
Khattab Khorsheed
doaj +1 more source
In this work we introduce the concept of quantum geo-encryption - a protocol that invokes direct quantum encryption of messages coupled to quantum location monitoring of the intended receiver.
Malaney, Robert
core +1 more source
A lightweight McEliece cryptosystem co-processor design [PDF]
Due to the rapid advances in the development of quantum computers and their susceptibility to errors, there is a renewed interest in error correction algorithms.
Agrawal, Rashmi +3 more
core
Decryption of tissue factor [PDF]
Tissue factor (TF) is a transmembrane protein which, in complex with factor (F)VIIa, initiates blood coagulation. Numerous studies have determined TF epitopes and individual amino acids which play an important role in the TF/FVIIa complex formation and its activity towards natural substrates.
Saulius, Butenas, Jolanta, Krudysz-Amblo
openaire +2 more sources
A novel original procedure of encryption/decryption based on the polyadic algebraic structures and on signal processing methods is proposed. First, we use signals with integer amplitudes to send information.
Steven Duplij, Qiang Guo
doaj +1 more source
Security of signed ELGamal encryption [PDF]
Assuming a cryptographically strong cyclic group G of prime order q and a random hash function H, we show that ElGamal encryption with an added Schnorr signature is secure against the adaptive chosen ciphertext attack, in which an attacker can freely use
Jakobsson, Markus, Schnorr, Claus Peter
core
The topic of Aadhaar links with the Indians in various ways. Aadhaar can be thought of as a digital infrastructure that has been an enabler and disabler in its ways. I exploresome of these ways through my article. I tried to question the proposition of introducing Aadhaar and carefully studied its theoretical bene?ts. Furthermore, I wish to explore the
openaire +3 more sources
Fluorescent probes allow dynamic visualization of phosphoinositides in living cells (left), whereas mass spectrometry provides high‐sensitivity, isomer‐resolved quantitation (right). Their synergistic use captures complementary aspects of lipid signaling. This review illustrates how these approaches reveal the spatiotemporal regulation and quantitative
Hiroaki Kajiho +3 more
wiley +1 more source

