Results 61 to 70 of about 58,616 (313)
A Wireless Sensor Network (WSN) is a collection of sensors that communicate or track a specific object. It is used in many fields of war, architecture, or espionage, but the wireless sensor network faces challenges in securing the path or the message ...
Haneen Mohammed Hussein+2 more
doaj +1 more source
A New Cryptography Method Based on Hill and Rail Fence Algorithms
Encryption has a great benefit, it provides privacy and security of all concepts of data transmitted across open networks. An urgent need for methods of strong encryption has become important with the rapid development of the computer, it detract from ...
Ashty M. Aaref
doaj +1 more source
In real time scenarios, the single image encryption schemes are not that efficient when a bunch of color images is to be encrypted. This problem should be addressed due to computational cost incurred by multiple executions of single color-image ...
Muhammad Hanif+6 more
doaj +1 more source
Security is one of the significant difficulties that individuals are confronting when the information exchanged over the internet in today's world. Cryptography is the way to achieve security of network or data by hiding the important information from ...
Mustafa Abd Zaid, Soukaena Hassan
doaj +1 more source
B‐cell chronic lymphocytic leukemia (B‐CLL) and monoclonal B‐cell lymphocytosis (MBL) show altered proteomes and phosphoproteomes, analyzed using mass spectrometry, protein microarrays, and western blotting. Identifying 2970 proteins and 316 phosphoproteins, including 55 novel phosphopeptides, we reveal BCR and NF‐kβ/STAT3 signaling in disease ...
Paula Díez+17 more
wiley +1 more source
Cost-Effective Architectures for RC5 Brute Force Cracking
In this paper, we discuss the options for brute-force cracking of the RC5 block cipher, that is, for revealing the unknown secret key, given a sample ciphertext and a portion of the corresponding plaintext. First, we summarize the methods employed by the
J. Buček+3 more
doaj
Color Image Encryption Algorithm Based on Hyper-Chaos and DNA Computing
In this study, a novel technique using a hyper chaotic dynamical system and DNA computing has been designed with high plaintext sensitivity. In order to reduce cost, a selection procedure using tent map has been employed for generating different key ...
M. G. Abbas Malik+3 more
doaj +1 more source
Encryption and Decryption [PDF]
As the foundation of all security enhanced systems, encryptions and decryptions are defined, and homomorphic (additive or multiplicative), probabilistic, commutative, and verifiable features are extracted as the desirable ones of encryption and decryption algorithms for developing secure anonymous systems.
openaire +2 more sources
The COMBAT classification system, developed through multi‐omics integration, stratifies adult patients with B‐cell acute lymphoblastic leukemia(B‐ALL) into three molecular subtypes with distinct surface antigen patterns, immune landscape, methylation patterns, biological pathways and prognosis.
Yang Song+11 more
wiley +1 more source
A Proposed Fully Homomorphic for Securing Cloud Banking Data at Rest
Fully homomorphic encryption (FHE) reaped the importance and amazement of most researchers and followers in data encryption issues, as programs are allowed to perform arithmetic operations on encrypted data without decrypting it and obtain results ...
Zana Thalage Omar, Fadhil Salman Abed
doaj +1 more source