Results 11 to 20 of about 8,966,306 (229)

Proposed Hybrid-Encryption System for Multicast Network [PDF]

open access: yesEngineering and Technology Journal, 2010
In this paper the proposed method based on two encrypted algorithms (Public key, and Block cipher) at the same time, it allowed a sender to encrypt the multicast packet and forward it into the packet network on the optimal distribution tree.
Mohammad Natiq Fadhil Ibraheem
doaj   +1 more source

Comparative Study of Database Security In Cloud Computing Using AES and DES Encryption Algorithms

open access: yesJournal of Information Security and Cybercrimes Research, 2019
Security is consider as one of the largest part important aspects in daily computing. The security is important in cloud computing especially for data save in cloud because it have sensitivity and import data as well many user can access to same data ...
Nora Abdullah Al-gohany   +1 more
doaj   +1 more source

Nuclear receptors and endocrine disruptors in fetal and neonatal testes: a gapped landscape.

open access: yesFrontiers in Endocrinology, 2015
During the last decades, many studies reported that male reproductive disorders are increasing among humans. It is currently acknowledged that these abnormalities can result from fetal exposure to environmental chemicals that are progressively becoming ...
Virginie eRouiller-Fabre   +26 more
doaj   +1 more source

The signature of cuproptosis-related immune genes predicts the tumor microenvironment and prognosis of prostate adenocarcinoma

open access: yesFrontiers in Immunology, 2023
BackgroundCuproptosis plays a crucial role in cancer, and different subtypes of cuproptosis have different immune profiles in prostate adenocarcinoma (PRAD).
Kai Yao   +8 more
doaj   +1 more source

DES22: DES BASED ALGORITHM WITH IMPROVED SECURITY

open access: yesJordanian Journal of Computers and Information Technology, 2022
We live in a world where the Internet has become the backbone of most of our dealings. The Internet has turned this big planet into a small village. The internet can be reached by everyone, everywhere, and anytime. Some authors predict that the number of
Malek M. Barhoush   +4 more
doaj   +1 more source

Phenolic hydrogen bond donors in the formation of non-ionic deep eutectic solvents: the quest for type V DES.

open access: yesChemical Communications, 2019
Mixtures of non-ionic compounds have been reported as DES but most are just ideal mixtures. In the thymol-menthol system, an abnormal strong interaction was identified stemming from the acidity difference of the phenolic and aliphatic hydroxyl groups ...
Dinis O. Abranches   +5 more
semanticscholar   +1 more source

A Facile Degumming Method of Kenaf Fibers Using Deep Eutectic Solution

open access: yesJournal of Natural Fibers, 2022
An eco-friendly and effective degumming method needed to be developed for producing kenaf bast fibers. This study devised a novel deep eutectic solvent (DES) method coupled with microwave and alkaline-ultrasonic treatment.
Kai Nie   +8 more
doaj   +1 more source

Comparison of Soda, Kraft, and DES Pulp Properties of European Black Poplar

open access: yesDrvna Industrija, 2022
Kraft pulping as the dominant pulping method contributes to several environmental problems. To overcome these problems, environmentally friendly pulping methods have been investigated. In the last years, deep eutectic solvents (DESs) have been identified
Sezgin Koray Gülsoy   +2 more
doaj   +1 more source

« Des mots, des mots, des mots! » [PDF]

open access: yesL’Annuaire théâtral: Revue québécoise d’études théâtrales, 1998
T. E. L. Des mots, des mots, des mots !. In: Manuel général de l'instruction primaire : journal hebdomadaire des instituteurs. 69e année, tome 38, 1902. pp. 635-636.
openaire   +4 more sources

Proposal to Complex DES Security Using Diffie Hellman Injection [PDF]

open access: yesEngineering and Technology Journal, 2011
Data Encryption Standard (DES) is based on a round of starters, from the results of the use of multi-stage permutation and replacement to the more complex algorithm which adopts the symmetric key.
Shatha habeeb Jafar
doaj   +1 more source

Home - About - Disclaimer - Privacy