Results 51 to 60 of about 60,215 (284)

APPLICATION OF A MATHEMATICAL MODEL FOR THE GENERATION OF SEPARATE ELEMENTS OF A STEGANOGRAPHIC SYSTEM IN A HIGHER EDUCATION INSTITUTION

open access: yesКомпютерні системи та інформаційні технології, 2023
The article presents the method of generating separate elements of the steganographic system based on the combination of cryptography and steganography methods, which makes it possible to increase the level of information protection and develop more ...
Liudmyla Nechvoloda   +2 more
doaj   +1 more source

Homomorphic Data Isolation for Hardware Trojan Protection

open access: yes, 2015
The interest in homomorphic encryption/decryption is increasing due to its excellent security properties and operating facilities. It allows operating on data without revealing its content.
Alanwar, Amr   +4 more
core   +1 more source

CD47 promotes mitogen‐activated protein kinase and epithelial‐to‐mesenchymal transition molecular programs to drive prometastatic phenotypes in non‐small cell lung cancer

open access: yesMolecular Oncology, EarlyView.
Beyond its role in immune evasion, this study identified that CD47 drives tumor‐intrinsic signaling in non‐small cell lung cancer (NSCLC). Transcriptomic profiling and functional studies revealed that CD47 regulates cell adhesion, migration, and metastasis through an ERK–EMT signaling axis.
Asa P.Y. Lau   +8 more
wiley   +1 more source

Robust Image Encryption based on Balanced Cellular Automaton and Pixel Separation [PDF]

open access: yesRadioengineering, 2016
The purpose of image encryption is to protect content from unauthorized access. Image encryption is usually done by pixel scrambling and confusion, so process is possible to reverse only by knowing secret information.
D. Tralic, S. Grgic
doaj  

ENCRYPTED CLASSIFIED VOICE INFORMATION AND THE MANAGEMENT OF ITS SUSTAINABILITY [PDF]

open access: yesJournal of Defense Resources Management, 2022
The problem of management of the reliable information security is one of the most important problems of our time. The problem of protecting information from unauthorized intervention and external impact is always topical and seriously investigated.
Elxan SABZİEV   +2 more
doaj  

EFFICIENT OTP GENERATION WITH ENCRYPTION AND DECRYPTION FOR SECURE FILE ACCESS IN CLOUD ENVIRONMENT

open access: yesICTACT Journal on Communication Technology, 2022
Cloud Computing (CC) has grown increasingly important in recent years, and the security issues related to the cloud model are also on the rise. The most used computer system authentication mechanism is One Time Password (OTP) which is easier and more ...
R. Manjupargavi, M.V. Srinath
doaj   +1 more source

Tissue factor: mechanisms of decryption [PDF]

open access: yesFrontiers in Bioscience, 2012
It is generally believed that only a small fraction of the tissue factor (TF) found on cell surfaces is active whereas the vast majority is cryptic in coagulation. It is unclear how cryptic TF differs from the coagulant active TF or potential mechanisms involved in transformation of cryptic TF to the coagulant active form.
L Vijaya Mohan, Rao   +2 more
openaire   +2 more sources

Insights into a long life without cancer: The case of the bowhead whale

open access: yesMolecular Oncology, EarlyView.
Long‐lived, large‐bodied organisms have evolved powerful anticancer mechanisms that preserve cellular and tissue integrity across extended lifespans. A recent study by Firsanov et al. shows that greater genome stability is a key factor underlying the remarkable longevity and cancer resistance of one such species, the bowhead whale.
Inés Paniagua, Johanna A. Joyce
wiley   +1 more source

Dynamical behavior of a new jerk system inspired from chaotic memory oscillators [PDF]

open access: yesArchives of Control Sciences
This paper constructs a six-term new simple 3D jerk system modeled by chaotic model memory oscillators with four parameters that control the behavior. The suitable choice of one of these parameters helps the system describe behavior and attractors.
Saad Fawzi Al-Azzawi
doaj   +1 more source

A Novel Color Image Encryption Algorithm Based on Hyperchaotic Maps and Mitochondrial DNA Sequences

open access: yesEntropy, 2020
Multimedia encryption innovation is one of the primary ways of securely and privately guaranteeing the security of media transmission. There are many advantages when utilizing the attributes of chaos, for example, arbitrariness, consistency, ergodicity ...
Heba G. Mohamed   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy