Results 51 to 60 of about 2,411 (231)
Improvement of the Minimal‐Guess‐Basis MILP Model and Its Application to ESF
The guess‐and‐determine technique find wide applications in the recovery of unknown variables within given system of relations. The fundamental concept behind this technique involves guessing certain unknown variables and deducing the remaining ones based on the relational system.
Lingchen Li +5 more
wiley +1 more source
Quantum‐Resistant Security in Digital Twin Healthcare Systems
Quantum‐safe architecture for secure healthcare data transmission integrating QKD, edge devices, and cloud‐based Digital Twin analytics. ABSTRACT The development of digital twin (DT) systems for healthcare presents several challenges, particularly in ensuring data protection and communication security in real‐time environments.
Ahmed K. Jameil, Hamed Al‐Raweshidy
wiley +1 more source
Commutative Cryptanalysis Made Practical
About 20 years ago, Wagner showed that most of the (then) known techniques used in the cryptanalysis of block ciphers were particular cases of what he called commutative diagram cryptanalysis.
Jules Baudrin +5 more
doaj +1 more source
Safe and Quickest Medical Image Encryption Using Logistic Map Derived S‐Boxes and Galois Field
The pseudorandomness, simplicity of use, and extreme sensitivity to even the slightest change in the initial value and handling parameters make chaotic maps attractive. The use of medical imaging to diagnose illnesses has grown in significance. These photographs need strong security measures because they are exchanged over public networks.
Mahwish Bano +5 more
wiley +1 more source
A Secure and Robust Blockchain‐Based Medical Image Encryption Approach Using Lorenz Chaotic System
Keeping medical images confidential while transmitting is crucial, especially in an open networking environment. One effective approach is blockchain‐based encryption, which provides strong security for sensitive healthcare data. To ensure the greatest levels of medical data integrity and authenticity, our proposed scheme employs a unique Lorenz ...
Fahima Hajjej +4 more
wiley +1 more source
Impossible Differential Cryptanalysis of GRANULE Algorithm [PDF]
The GRANULE algorithm is an ultra-lightweight block cipher algorithm with good hardware and software implementation performance,but now the algorithm lacks security estimation result under impossible differential analysis.Therefore,using middle error ...
SHI Shuying, HE Jun
doaj +1 more source
This work presents a secure telemedicine cryptosystem based on a novel 4D memristive chaotic oscillator and a Dispatched Gray Code Scrambler (DGCS). Implemented on FPGA, the system ensures power‐efficient encryption, making it suitable for real‐time medical image transmission in IoT healthcare environments.
Fritz Nguemo Kemdoum +3 more
wiley +1 more source
Distribution of the best nonzero differential and linear approximations of s-box functions
In the paper the differential and the linear approximations of two classes of s-box functions are considered. The classes are the permutations and arbitrary functions with n binary inputs and m binary outputs, where 1≤n=m≤10.
Krzysztof Chmiel
doaj +1 more source
Security evaluation, NPCR + UACI results of 99.5978% and 33.4549% respectively, confirm the system is secure against statistical and differential attacks. Besides, the FPGA implementation achieves low power of 115 mW at a speed of 42.56 MHz. This makes it suitable for IoT applications where power and hardware resources are constrained. ABSTRACT In this
Fritz Nguemo Kemdoum +4 more
wiley +1 more source
ABSTRACT Background and Aims Despite their widespread use, randomized clinical trials (RCTs) face challenges like differential loss to follow‐up, which can impact validity. Real‐world evidence (RWE) from real‐world data (RWD) is increasingly used to address these limitations, but RCTs and RWE have provided complementary, disconnected observations of ...
Michael Batech +7 more
wiley +1 more source

