Results 71 to 80 of about 8,381 (240)

Cryptanalysis and Improved Image Encryption Scheme Using Elliptic Curve and Affine Hill Cipher

open access: yesMathematics, 2022
In the present era of digital communication, secure data transfer is a challenging task in the case of open networks. Low-key-strength encryption techniques incur enormous security threats.
Parveiz Nazir Lone   +5 more
doaj   +1 more source

AstroGeoFit. A Genetic Algorithm and Bayesian Approach for the Astronomical Calibration of the Geological Timescale

open access: yesPaleoceanography and Paleoclimatology, Volume 40, Issue 8, August 2025.
Abstract Variations in Earth's orbit and axial tilt induce climatic changes which are recorded in sedimentary deposits. The frequencies of these cyclical variations are integer combinations of the main secular frequencies of the solar system. Analyzing these cycles in sedimentary records can help establish an astronomical time scale for the geological ...
N. Hoang   +7 more
wiley   +1 more source

iTrust—A Trustworthy and Efficient Mapping Scheme in Elliptic Curve Cryptography

open access: yesSensors, 2020
Recently, many platforms have outsourced tasks to numerous smartphone devices known as Mobile Crowd-sourcing System (MCS). The data is collected and transferred to the platform for further analysis and processing.
Hisham Almajed   +2 more
doaj   +1 more source

KRIPTOGRAFI VISUAL PADA GAMBAR BERWARNA (RGB) MENGGUNAKAN ALGORITMA ELLIPTIC CURVE CRYPTOGRAPHY [PDF]

open access: yes, 2020
ABSTRAK Kriptografi berperan penting pada era digital dalam mengamankan data dari peretas. Seiring berkembangnya teknologi, data yang dapat diamankan menggunakan kriptografi semakin luas, salah satunya adalah mengamankan gambar menggunakan kriptografi ...
Della Annisa Zahra, -
core  

Security in Metaverse Markets: Challenges and Solutions—A Comprehensive Review

open access: yesExpert Systems, Volume 42, Issue 8, August 2025.
ABSTRACT This review paper provides a systematic overview of the metaverse markets security problems and solutions. The metaverse is an emerging digital space, bridging virtual, augmented and mixed reality environments. As the metaverse evolves, issues related to customer security have emerged, which include breaches of privacy, thefts of identity and ...
Mohammad Z. Aloudat   +3 more
wiley   +1 more source

Design of an Elliptic Curve Cryptography Processor for RFID Tag Chips

open access: yesSensors, 2014
Radio Frequency Identification (RFID) is an important technique for wireless sensor networks and the Internet of Things. Recently, considerable research has been performed in the combination of public key cryptography and RFID.
Zilong Liu   +4 more
doaj   +1 more source

ECC programming in Java Card [PDF]

open access: yes, 2014
9 páginas, 3 figuras, 3 listingElliptic Curve Cryptography (ECC) is a branch of public-key cryptography based on the arithmetic of el- liptic curves.
Gayoso Martínez, Víctor   +1 more
core   +1 more source

Nanoscale Curvature Regulates YAP/TAZ Nuclear Localization Through Nuclear Deformation and Rupture

open access: yesAdvanced Science, Volume 12, Issue 28, July 24, 2025.
This study uses experiments and biophysical modeling to examine the response and adaptation of cells to nanoscale topography of surfaces. It is shown that cytoskeletal assembly and nuclear localization of transcription regulatory factors such as yes‐associated protein (YAP) and transcriptional coactivator with PDZ‐binding motif (TAZ) can be tuned by ...
Emmet A. Francis   +7 more
wiley   +1 more source

Next-generation ECC processor on FPGA: Leveraging Koblitz curves for enhanced performance

open access: yesAin Shams Engineering Journal
This paper presents a hardware design of an Elliptic Curve Cryptography (ECC) processor optimized for Field Programmable Gate Arrays (FPGAs), focusing on the Koblitz curve Secp256k1.
Tung Nguyen   +4 more
doaj   +1 more source

Integrating identity-based cryptography in IMS service authentication

open access: yes, 2009
Nowadays, the IP Multimedia Subsystem (IMS) is a promising research field. Many ongoing works related to the security and the performances of its employment are presented to the research community. Although, the security and data privacy aspects are very
Abid, Mohamed   +3 more
core   +6 more sources

Home - About - Disclaimer - Privacy