Results 101 to 110 of about 459,845 (362)
Users of the cloud have been given access to high-quality, on-demand services, without being concerned about the sustaining infrastructure and software. While increasing the security concerns for private and confidential information, this brings emphasis
D. Deena Rose, C. Agees Kumar
doaj +1 more source
Secret Channel using Video Steganography
Video steganography is about hiding the secret message into the video as the cover media. Steganography is a technique use to secure the transmission of secret information or hide their existence.
Lee Kar Yee, Chuah Chai Wen
doaj +1 more source
Multipath Data Storage by Third-Order Nonlinear Optical Properties in Zinc Oxide Nanostructures
Simultaneous activation of multiphotonic absorption and nonlinear optical refraction were employed for developing a multipath load balancing technique assisted by light and zinc oxide nanostructures.
Federico Ortíz-Trejo +4 more
doaj +1 more source
AbstractThe study of homomorphic encryption techniques has led to significant advancements in the computing domain, particularly in the sphere of cloud computing. Homomorphic encryption provides a means for securely transmitting and storing confidential information across and in a computer system.
Ogburn, Monique +2 more
openaire +1 more source
U.S. Export Controls on Technology Transfers [PDF]
Companies selling technology products abroad must be careful that they have complied with regulations imposed on the exportation of technology products. This is especially true for companies seeking to export encryption technology.
Crane, Matthew
core +1 more source
Novel and unscrutinized immune entities of the zebrafish gut
Understudied cells of the zebrafish immune system include bona fide immune cells and epithelial (‐derived) cells with immune functions. Research focusing on zebrafish cells which demonstrate similarities to mammalian immune cell counterparts may help us understand the pathologies in which they are implicated. Currently available and advanced tools make
Audrey Inge Schytz Andersen‐Civil +5 more
wiley +1 more source
This paper proposes an innovative fusion of encryption and compression techniques that optimizes data handling and security. The approach employs a layered non-encoding encryption-compression algorithm DQRc (Data in Quick Response Code) that attempts to ...
Pratham Mishra +4 more
doaj +1 more source
Single‐cell RNA sequencing reveals an opposite role of SLPI in basal tumors based on metastatic spread, along with shared activation of specific regulons in cancer cells and mature luminal lactocytes, as well as downregulation of MALAT1 and NEAT1 in the latter.
Pietro Ancona +4 more
wiley +1 more source
Protein kinase FAM20C—when subcellular localization matters
FAM20C is a Golgi‐resident kinase that phosphorylates proteins along the entire secretory pathway. The presence of potential FAM20C substrates in the cytoplasm or nucleus raises the question of how the kinase and its substrates encounter each other. Protein kinases achieve signaling specificity through consensus sequence recognition and subcellular ...
Francesca Noventa, Mauro Salvi
wiley +1 more source
Cryptography: Mathematical Advancements on Cyber Security [PDF]
The origin of cryptography, the study of encoding and decoding messages, dates back to ancient times around 1900 BC. The ancient Egyptians enlisted the use of basic encryption techniques to conceal personal information.
Bower, Kristin
core +1 more source

