Results 41 to 50 of about 39,375 (295)

Decrypting Aadhaar

open access: yes, 2021
The topic of Aadhaar links with the Indians in various ways. Aadhaar can be thought of as a digital infrastructure that has been an enabler and disabler in its ways. I exploresome of these ways through my article. I tried to question the proposition of introducing Aadhaar and carefully studied its theoretical bene?ts. Furthermore, I wish to explore the
openaire   +3 more sources

Spatiotemporal and quantitative analyses of phosphoinositides – fluorescent probe—and mass spectrometry‐based approaches

open access: yesFEBS Letters, EarlyView.
Fluorescent probes allow dynamic visualization of phosphoinositides in living cells (left), whereas mass spectrometry provides high‐sensitivity, isomer‐resolved quantitation (right). Their synergistic use captures complementary aspects of lipid signaling. This review illustrates how these approaches reveal the spatiotemporal regulation and quantitative
Hiroaki Kajiho   +3 more
wiley   +1 more source

Polyadic Encryption

open access: yesAxioms
A novel original procedure of encryption/decryption based on the polyadic algebraic structures and on signal processing methods is proposed. First, we use signals with integer amplitudes to send information.
Steven Duplij, Qiang Guo
doaj   +1 more source

Protein pyrophosphorylation by inositol pyrophosphates — detection, function, and regulation

open access: yesFEBS Letters, EarlyView.
Protein pyrophosphorylation is an unusual signaling mechanism that was discovered two decades ago. It can be driven by inositol pyrophosphate messengers and influences various cellular processes. Herein, we summarize the research progress and challenges of this field, covering pathways found to be regulated by this posttranslational modification as ...
Sarah Lampe   +3 more
wiley   +1 more source

Improving the security of LSB image steganography

open access: yesJOIV: International Journal on Informatics Visualization, 2019
Steganography is the technique of hiding secret data (message) within any media such as digital color image. In this paper we will merge steganography process with cryptography process in order to increase the security of the proposed method.
Jamil Al-Azzeh   +3 more
doaj   +1 more source

Survey on Modern Cryptography

open access: yesJournal of Kufa for Mathematics and Computer, 2021
Security is one of the significant difficulties that individuals are confronting when the information exchanged over the internet in today's world. Cryptography is the way to achieve security of network or data by hiding the important information from ...
Mustafa Abd Zaid, Soukaena Hassan
doaj   +1 more source

A Paper‐Like Hydrogel for Versatile Information Encryption and Decryption Via Chemical‐Induced Phase Separation

open access: yesAdvanced Functional Materials
Information coding, recording, encryption, and decryption are of great importance in the field of anti‐counterfeiting, especially in the current AI information era.
Jun-Bo Hou, Xin‐Shi Chen, Yue Zhao
semanticscholar   +1 more source

Conserved structural motifs in PAS, LOV, and CRY proteins regulate circadian rhythms and are therapeutic targets

open access: yesFEBS Letters, EarlyView.
Cryptochrome and PAS/LOV proteins play intricate roles in circadian clocks where they act as both sensors and mediators of protein–protein interactions. Their ubiquitous presence in signaling networks has positioned them as targets for small‐molecule therapeutics. This review provides a structural introduction to these protein families.
Eric D. Brinckman   +2 more
wiley   +1 more source

Secure Particle Filtering With Paillier Encryption–Decryption Scheme: Application to Multi-Machine Power Grids

open access: yesIEEE Transactions on Smart Grid
This paper is concerned with the encryption-decryption-based state estimation problem for a class of multi-machine power grids with non-Gaussian noises.
Bogang Qu   +4 more
semanticscholar   +1 more source

FPGA Implementation of Improved Security Approach for Medical Image Encryption and Decryption

open access: yesScientific Programming, 2021
Securing medical images is a great challenge to protect medical privacy. An image encryption model founded on a complex chaos-based Pseudorandom Number Generator (PRNG) and Modified Advanced Encryption Standard (MAES) is put forward in this paper.
Amal Hafsa   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy