Results 41 to 50 of about 58,616 (313)
This paper proposes an innovative fusion of encryption and compression techniques that optimizes data handling and security. The approach employs a layered non-encoding encryption-compression algorithm DQRc (Data in Quick Response Code) that attempts to ...
Pratham Mishra+4 more
doaj +1 more source
Large decryption exponents in RSA
Peer ...
Hernández Encinas, Luis+2 more
openaire +3 more sources
A structural decryption of cryptochromes
Cryptochromes (CRYs), which are signaling proteins related to DNA photolyases, play pivotal roles in sensory responses throughout biology, including growth and development, metabolic regulation, circadian rhythm entrainment and geomagnetic field sensing.
Cristina C. DeOliveira, Brian R. Crane
openaire +3 more sources
ANALYSIS OF THE TECHNOLOGY OF SPACE IMAGES DECRYPTION
The article is devoted to the analysis of the process of detecting and recognizing objects from the space monitoring data, while the military decryption technology is represented by four levels, which are caused with direct and inverse connections ...
Олександр Васильович Лаврінчук+2 more
doaj +1 more source
FOUR STAGE SECURITY ALGORITHM FOR DATA TRANSFER TO IMPROVE SECURITY IN MANET
Mobile Ad hoc Network (MANET) regarded to be a group of mobile nodes that can communicate with others in the absence of network infrastructure. MANET is at high risk due to its basic features, such as peer-to-peer (P2P) architecture; wireless shared ...
C. Chandra Prabha+1 more
doaj +1 more source
B cells sense external mechanical forces and convert them into biochemical signals through mechanotransduction. Understanding how malignant B cells respond to physical stimuli represents a groundbreaking area of research. This review examines the key mechano‐related molecules and pathways in B lymphocytes, highlights the most relevant techniques to ...
Marta Sampietro+2 more
wiley +1 more source
Single image encryption schemes are not efficient enough when a bunch of images is to be encrypted in some real-world setting. To overcome this problem, an efficient and secured multiple images encryption scheme is proposed in this study using two ...
Muhammad Hanif+4 more
doaj +1 more source
Single‐cell insights into the role of T cells in B‐cell malignancies
Single‐cell technologies have transformed our understanding of T cell–tumor cell interactions in B‐cell malignancies, revealing new T‐cell subsets, functional states, and immune evasion mechanisms. This Review synthesizes these findings, highlighting the roles of T cells in pathogenesis, progression, and therapy response, and underscoring their ...
Laura Llaó‐Cid
wiley +1 more source
The security of powering systems has been a major problem over the last decade, leading to an increased interest in wireless power and data transfer. In this research paper, a new inductive Wireless Power Transfer (WPT) circuit topology has been used. In
Colin Sokol Kuka+4 more
doaj +1 more source
Decrypting SSL/TLS traffic for hidden threats detection
The paper presents an analysis of the main mechanisms of decryption of SSL/TLS traffic. Methods and technologies for detecting malicious activity in encrypted traffic that are used by leading companies are also considered.
Ageyev, Dmytro+4 more
core +1 more source