Results 91 to 100 of about 441,462 (365)

Quantum Resistant Random Linear Code Based Public Key Encryption Scheme RLCE [PDF]

open access: yes, 2015
Lattice based encryption schemes and linear code based encryption schemes have received extensive attention in recent years since they have been considered as post-quantum candidate encryption schemes.
Wang, Yongge
core   +2 more sources

Purification tags markedly affect self‐aggregation of CPEB3

open access: yesFEBS Letters, EarlyView.
Although recombinant proteins are used to study protein aggregation in vitro, uncleaved tags can interfere with accurate interpretation. Our findings demonstrate that His₆‐GFP and His₁₂ tags significantly affect liquid droplet and amyloid fibril formation in the intrinsically disordered region (IDR) of mouse cytoplasmic polyadenylation element‐binding ...
Harunobu Saito   +6 more
wiley   +1 more source

Insights into pegRNA design from editing of the cardiomyopathy‐associated phospholamban R14del mutation

open access: yesFEBS Letters, EarlyView.
This study reveals how prime editing guide RNA (pegRNA) secondary structure and reverse transcriptase template length affect prime editing efficiency in correcting the phospholamban R14del cardiomyopathy‐associated mutation. Insights support the design of structurally optimized enhanced pegRNAs for precise gene therapy.
Bing Yao   +7 more
wiley   +1 more source

Encrypted Arabic Documents Search Model using Fuzzy Keywords in Cloud Computing

open access: yesJOIV: International Journal on Informatics Visualization, 2017
Cloud computing is a burgeoning and revolutionary technology that has changed how data are stored and computed in the cloud. This technology incorporates many elements into an innovative architecture.
Nidal Hassan Hussein   +2 more
doaj   +1 more source

A Novel Chaotic Image Encryption using Generalized Threshold Function

open access: yes, 2012
In this paper, after reviewing the main points of image encryption and threshold function, we introduce the methods of chaotic image encryption based on pseudorandom bit padding that the bits be generated by the novel generalized threshold function ...
Ahadpour, Sodeif   +2 more
core   +1 more source

An Efficient Image Encryption Scheme Based on the LSS Chaotic Map and Single S-Box

open access: yesIEEE Access, 2020
This paper presents an efficient and secure chaotic S-Box based image encryption algorithm. Firstly, by cryptanalyzing a multiple chaotic S-Boxes based image encryption algorithm, we successfully cracked the cryptosystem by using chosen-plaintext attack (
Qing Lu, Congxu Zhu, Xiaoheng Deng
semanticscholar   +1 more source

Single‐cell insights into the role of T cells in B‐cell malignancies

open access: yesFEBS Letters, EarlyView.
Single‐cell technologies have transformed our understanding of T cell–tumor cell interactions in B‐cell malignancies, revealing new T‐cell subsets, functional states, and immune evasion mechanisms. This Review synthesizes these findings, highlighting the roles of T cells in pathogenesis, progression, and therapy response, and underscoring their ...
Laura Llaó‐Cid
wiley   +1 more source

A Spatiotemporal-chaos-based Encryption Having Overall Properties Considerably Better Than Advanced Encryption Standard

open access: yes, 2003
Spatiotemporal chaos of a two-dimensional one-way coupled map lattice is used for chaotic cryptography. The chaotic outputs of many space units are used for encryption simultaneously.
Hu, Gang   +6 more
core   +2 more sources

SDR Implementation of a D2D Security Cryptographic Mechanism

open access: yesIEEE Access, 2019
Device-to-device (D2D) communication represents a promising technique to enable devices to communicate directly without the interaction of access points or base stations. The ad hoc and proximity nature of this communication introduce some very important
Titus Balan   +2 more
doaj   +1 more source

Personal Data Security: Divergent Standards in the European Union and the United States [PDF]

open access: yes, 1995
This Note argues that the U.S. Government should discontinue all attempts to establish EES as the de facto encryption standard in the United States because the economic disadvantages associated with widespread implementation of EES outweigh the ...
Fleischmann, Amy
core   +1 more source

Home - About - Disclaimer - Privacy