Results 61 to 70 of about 58,616 (313)

Encryption of a Message by HillAli Cipher and Security of Routing Path by DSR in Wireless Sensor Network

open access: yesJournal of Communications Software and Systems
A Wireless Sensor Network (WSN) is a collection of sensors that communicate or track a specific object. It is used in many fields of war, architecture, or espionage, but the wireless sensor network faces challenges in securing the path or the message ...
Haneen Mohammed Hussein   +2 more
doaj   +1 more source

A New Cryptography Method Based on Hill and Rail Fence Algorithms

open access: yesDiyala Journal of Engineering Sciences, 2017
Encryption has a great benefit, it provides privacy and security of all concepts of data transmitted across open networks. An urgent need for methods of strong encryption has become important with the rapid development of the computer, it detract from ...
Ashty M. Aaref
doaj   +1 more source

A Novel and Efficient Multiple RGB Images Cipher Based on Chaotic System and Circular Shift Operations

open access: yesIEEE Access, 2020
In real time scenarios, the single image encryption schemes are not that efficient when a bunch of color images is to be encrypted. This problem should be addressed due to computational cost incurred by multiple executions of single color-image ...
Muhammad Hanif   +6 more
doaj   +1 more source

Survey on Modern Cryptography

open access: yesJournal of Kufa for Mathematics and Computer, 2021
Security is one of the significant difficulties that individuals are confronting when the information exchanged over the internet in today's world. Cryptography is the way to achieve security of network or data by hiding the important information from ...
Mustafa Abd Zaid, Soukaena Hassan
doaj   +1 more source

Tonic signaling of the B‐cell antigen‐specific receptor is a common functional hallmark in chronic lymphocytic leukemia cell phosphoproteomes at early disease stages

open access: yesMolecular Oncology, EarlyView.
B‐cell chronic lymphocytic leukemia (B‐CLL) and monoclonal B‐cell lymphocytosis (MBL) show altered proteomes and phosphoproteomes, analyzed using mass spectrometry, protein microarrays, and western blotting. Identifying 2970 proteins and 316 phosphoproteins, including 55 novel phosphopeptides, we reveal BCR and NF‐kβ/STAT3 signaling in disease ...
Paula Díez   +17 more
wiley   +1 more source

Cost-Effective Architectures for RC5 Brute Force Cracking

open access: yesActa Polytechnica, 2005
In this paper, we discuss the options for brute-force cracking of the RC5 block cipher, that is, for revealing the unknown secret key, given a sample ciphertext and a portion of the corresponding plaintext. First, we summarize the methods employed by the
J. Buček   +3 more
doaj  

Color Image Encryption Algorithm Based on Hyper-Chaos and DNA Computing

open access: yesIEEE Access, 2020
In this study, a novel technique using a hyper chaotic dynamical system and DNA computing has been designed with high plaintext sensitivity. In order to reduce cost, a selection procedure using tent map has been employed for generating different key ...
M. G. Abbas Malik   +3 more
doaj   +1 more source

Encryption and Decryption [PDF]

open access: yes, 2012
As the foundation of all security enhanced systems, encryptions and decryptions are defined, and homomorphic (additive or multiplicative), probabilistic, commutative, and verifiable features are extracted as the desirable ones of encryption and decryption algorithms for developing secure anonymous systems.
openaire   +2 more sources

Comprehensive omics‐based classification system in adult patients with B‐cell acute lymphoblastic leukemia

open access: yesMolecular Oncology, EarlyView.
The COMBAT classification system, developed through multi‐omics integration, stratifies adult patients with B‐cell acute lymphoblastic leukemia(B‐ALL) into three molecular subtypes with distinct surface antigen patterns, immune landscape, methylation patterns, biological pathways and prognosis.
Yang Song   +11 more
wiley   +1 more source

A Proposed Fully Homomorphic for Securing Cloud Banking Data at Rest

open access: yesUHD Journal of Science and Technology, 2020
Fully homomorphic encryption (FHE) reaped the importance and amazement of most researchers and followers in data encryption issues, as programs are allowed to perform arithmetic operations on encrypted data without decrypting it and obtain results ...
Zana Thalage Omar, Fadhil Salman Abed
doaj   +1 more source

Home - About - Disclaimer - Privacy