Results 41 to 50 of about 58,616 (313)

A Lossless Layered-Based Non-Encoding Plain Text Compression and Encryption Algorithm Utilizing Binary Fragmentation and Defragmentation Technique

open access: yesIEEE Access
This paper proposes an innovative fusion of encryption and compression techniques that optimizes data handling and security. The approach employs a layered non-encoding encryption-compression algorithm DQRc (Data in Quick Response Code) that attempts to ...
Pratham Mishra   +4 more
doaj   +1 more source

Large decryption exponents in RSA

open access: yesApplied Mathematics Letters, 2003
Peer ...
Hernández Encinas, Luis   +2 more
openaire   +3 more sources

A structural decryption of cryptochromes

open access: yesFrontiers in Chemistry
Cryptochromes (CRYs), which are signaling proteins related to DNA photolyases, play pivotal roles in sensory responses throughout biology, including growth and development, metabolic regulation, circadian rhythm entrainment and geomagnetic field sensing.
Cristina C. DeOliveira, Brian R. Crane
openaire   +3 more sources

ANALYSIS OF THE TECHNOLOGY OF SPACE IMAGES DECRYPTION

open access: yesSučasnì Informacìjnì Tehnologìï u Sferì Bezpeki ta Oboroni, 2017
The article is devoted to the analysis of the process of detecting and recognizing objects from the space monitoring data, while the military decryption technology is represented by four levels, which are caused with direct and inverse connections ...
Олександр Васильович Лаврінчук   +2 more
doaj   +1 more source

FOUR STAGE SECURITY ALGORITHM FOR DATA TRANSFER TO IMPROVE SECURITY IN MANET

open access: yesICTACT Journal on Communication Technology, 2022
Mobile Ad hoc Network (MANET) regarded to be a group of mobile nodes that can communicate with others in the absence of network infrastructure. MANET is at high risk due to its basic features, such as peer-to-peer (P2P) architecture; wireless shared ...
C. Chandra Prabha   +1 more
doaj   +1 more source

B cell mechanobiology in health and disease: emerging techniques and insights into therapeutic responses

open access: yesFEBS Letters, EarlyView.
B cells sense external mechanical forces and convert them into biochemical signals through mechanotransduction. Understanding how malignant B cells respond to physical stimuli represents a groundbreaking area of research. This review examines the key mechano‐related molecules and pathways in B lymphocytes, highlights the most relevant techniques to ...
Marta Sampietro   +2 more
wiley   +1 more source

A Novel and Efficient 3D Multiple Images Encryption Scheme Based on Chaotic Systems and Swapping Operations

open access: yesIEEE Access, 2020
Single image encryption schemes are not efficient enough when a bunch of images is to be encrypted in some real-world setting. To overcome this problem, an efficient and secured multiple images encryption scheme is proposed in this study using two ...
Muhammad Hanif   +4 more
doaj   +1 more source

Single‐cell insights into the role of T cells in B‐cell malignancies

open access: yesFEBS Letters, EarlyView.
Single‐cell technologies have transformed our understanding of T cell–tumor cell interactions in B‐cell malignancies, revealing new T‐cell subsets, functional states, and immune evasion mechanisms. This Review synthesizes these findings, highlighting the roles of T cells in pathogenesis, progression, and therapy response, and underscoring their ...
Laura Llaó‐Cid
wiley   +1 more source

A Novel True Random Number Generator in Near Field Communication as Memristive Wireless Power Transmission

open access: yesJ, 2021
The security of powering systems has been a major problem over the last decade, leading to an increased interest in wireless power and data transfer. In this research paper, a new inductive Wireless Power Transfer (WPT) circuit topology has been used. In
Colin Sokol Kuka   +4 more
doaj   +1 more source

Decrypting SSL/TLS traffic for hidden threats detection

open access: yes, 2019
The paper presents an analysis of the main mechanisms of decryption of SSL/TLS traffic. Methods and technologies for detecting malicious activity in encrypted traffic that are used by leading companies are also considered.
Ageyev, Dmytro   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy