Results 51 to 60 of about 62,245 (351)
The telecare medical information systems (TMISs) provide the convenience to the patients/users to be served at home. Along with such ease, it is essential to preserve the privacy and to provide the security to the patients/users in TMIS.
Shuming Qiu+3 more
semanticscholar +1 more source
This study demonstrates a molecular strategy to enhance the stretchability of conjugated polymers by incorporating plasticizing molecular additives (PMAs). PMAs reduce the persistence length and promote chain entanglement, enabling deformable thin films with preserved electrical performance. A systematic analysis combining rheology, neutron scattering,
Sein Chung+11 more
wiley +1 more source
KRIPTOGRAFI VISUAL PADA GAMBAR BERWARNA (RGB) MENGGUNAKAN ALGORITMA ELLIPTIC CURVE CRYPTOGRAPHY [PDF]
ABSTRAK Kriptografi berperan penting pada era digital dalam mengamankan data dari peretas. Seiring berkembangnya teknologi, data yang dapat diamankan menggunakan kriptografi semakin luas, salah satunya adalah mengamankan gambar menggunakan kriptografi ...
Della Annisa Zahra, -
core
Bioinspired Design of a Wet‐Adhesive Cornea Glue Based on Recombinant Human Protein Networks
Natures protein‐based high performance materials e.g. elastin, silk and muscle proteins have been mimicked by a new protein‐hybrid material based on redesigned human partial sequences only, showing high wet‐adhesiveness and elasticity for biomedical applications.
Anna Resch+17 more
wiley +1 more source
Isogeny-based post-quantum key exchange protocols [PDF]
The goal of this project is to understand and analyze the supersingular isogeny Diffie Hellman (SIDH), a post-quantum key exchange protocol which security lies on the isogeny-finding problem between supersingular elliptic curves.
Sorinas Capdevila, Ernest
core
A new perspective for treatment of gastric cancer is proposed utilizing 4D printing to develop shape morphing, deployable, and magnetically guided local drug releasing patches. The deployed patches are envisioned to adhere at the tumor site to locally deliver high drug amounts.
Dina B. Mahmoud+3 more
wiley +1 more source
Elliptic Curve Cryptography with Machine Learning
Elliptic Curve Cryptography (ECC) is a technology based on the arithmetic of elliptic curves used to build strong and efficient cryptosystems and infrastructures. Several ECC systems, such as the Diffie–Hellman key exchange and the Elliptic Curve Digital
Jihane Jebrane+3 more
doaj +1 more source
Implementasi Algoritma ECDSA untuk Pengamanan E-Mail (Verifikasi Keaslian Pesan) [PDF]
This final project is discussed about implementation of digital signature on email delivery with java programming language. Digital signature is one of the cryptographic security services that provide assurance to the recipient of the message (receiver).
Prabowo, Pualam Sendi Agung+2 more
core
Families of fast elliptic curves from Q-curves [PDF]
We construct new families of elliptic curves over \(\FF_{p^2}\) with efficiently computable endomorphisms, which can be used to accelerate elliptic curve-based cryptosystems in the same way as Gallant-Lambert-Vanstone (GLV) and Galbraith-Lin-Scott (GLS ...
Smith, Benjamin
core +7 more sources
We report a 3.2 Å cryoEM structure of functional amyloid protein FapC from Pseudomonas sp. UK4, an essential component of bacterial biofilm, which reveals a Greek key‐shaped protofilament, supports bioinformatically determined motifs, nuances AlphaFold predictions, emphasizes heterogeneous cross‐β stacking in amyloid cross‐seeding and shows strain ...
Yanting Jiang+13 more
wiley +1 more source