Results 51 to 60 of about 60,215 (284)
The article presents the method of generating separate elements of the steganographic system based on the combination of cryptography and steganography methods, which makes it possible to increase the level of information protection and develop more ...
Liudmyla Nechvoloda +2 more
doaj +1 more source
Homomorphic Data Isolation for Hardware Trojan Protection
The interest in homomorphic encryption/decryption is increasing due to its excellent security properties and operating facilities. It allows operating on data without revealing its content.
Alanwar, Amr +4 more
core +1 more source
Beyond its role in immune evasion, this study identified that CD47 drives tumor‐intrinsic signaling in non‐small cell lung cancer (NSCLC). Transcriptomic profiling and functional studies revealed that CD47 regulates cell adhesion, migration, and metastasis through an ERK–EMT signaling axis.
Asa P.Y. Lau +8 more
wiley +1 more source
Robust Image Encryption based on Balanced Cellular Automaton and Pixel Separation [PDF]
The purpose of image encryption is to protect content from unauthorized access. Image encryption is usually done by pixel scrambling and confusion, so process is possible to reverse only by knowing secret information.
D. Tralic, S. Grgic
doaj
ENCRYPTED CLASSIFIED VOICE INFORMATION AND THE MANAGEMENT OF ITS SUSTAINABILITY [PDF]
The problem of management of the reliable information security is one of the most important problems of our time. The problem of protecting information from unauthorized intervention and external impact is always topical and seriously investigated.
Elxan SABZİEV +2 more
doaj
EFFICIENT OTP GENERATION WITH ENCRYPTION AND DECRYPTION FOR SECURE FILE ACCESS IN CLOUD ENVIRONMENT
Cloud Computing (CC) has grown increasingly important in recent years, and the security issues related to the cloud model are also on the rise. The most used computer system authentication mechanism is One Time Password (OTP) which is easier and more ...
R. Manjupargavi, M.V. Srinath
doaj +1 more source
Tissue factor: mechanisms of decryption [PDF]
It is generally believed that only a small fraction of the tissue factor (TF) found on cell surfaces is active whereas the vast majority is cryptic in coagulation. It is unclear how cryptic TF differs from the coagulant active TF or potential mechanisms involved in transformation of cryptic TF to the coagulant active form.
L Vijaya Mohan, Rao +2 more
openaire +2 more sources
Insights into a long life without cancer: The case of the bowhead whale
Long‐lived, large‐bodied organisms have evolved powerful anticancer mechanisms that preserve cellular and tissue integrity across extended lifespans. A recent study by Firsanov et al. shows that greater genome stability is a key factor underlying the remarkable longevity and cancer resistance of one such species, the bowhead whale.
Inés Paniagua, Johanna A. Joyce
wiley +1 more source
Dynamical behavior of a new jerk system inspired from chaotic memory oscillators [PDF]
This paper constructs a six-term new simple 3D jerk system modeled by chaotic model memory oscillators with four parameters that control the behavior. The suitable choice of one of these parameters helps the system describe behavior and attractors.
Saad Fawzi Al-Azzawi
doaj +1 more source
A Novel Color Image Encryption Algorithm Based on Hyperchaotic Maps and Mitochondrial DNA Sequences
Multimedia encryption innovation is one of the primary ways of securely and privately guaranteeing the security of media transmission. There are many advantages when utilizing the attributes of chaos, for example, arbitrariness, consistency, ergodicity ...
Heba G. Mohamed +2 more
doaj +1 more source

