Results 101 to 110 of about 459,845 (362)

Application of novel security technique in cloud environment using attribute dependent authentication for health care

open access: yesAutomatika
Users of the cloud have been given access to high-quality, on-demand services, without being concerned about the sustaining infrastructure and software. While increasing the security concerns for private and confidential information, this brings emphasis
D. Deena Rose, C. Agees Kumar
doaj   +1 more source

Secret Channel using Video Steganography

open access: yesJOIV: International Journal on Informatics Visualization, 2017
Video steganography is about hiding the secret message into the video as the cover media. Steganography is a technique use to secure the transmission of secret information or hide their existence.
Lee Kar Yee, Chuah Chai Wen
doaj   +1 more source

Multipath Data Storage by Third-Order Nonlinear Optical Properties in Zinc Oxide Nanostructures

open access: yesApplied Sciences, 2020
Simultaneous activation of multiphotonic absorption and nonlinear optical refraction were employed for developing a multipath load balancing technique assisted by light and zinc oxide nanostructures.
Federico Ortíz-Trejo   +4 more
doaj   +1 more source

Homomorphic Encryption

open access: yesProcedia Computer Science, 2013
AbstractThe study of homomorphic encryption techniques has led to significant advancements in the computing domain, particularly in the sphere of cloud computing. Homomorphic encryption provides a means for securely transmitting and storing confidential information across and in a computer system.
Ogburn, Monique   +2 more
openaire   +1 more source

U.S. Export Controls on Technology Transfers [PDF]

open access: yes, 2001
Companies selling technology products abroad must be careful that they have complied with regulations imposed on the exportation of technology products. This is especially true for companies seeking to export encryption technology.
Crane, Matthew
core   +1 more source

Novel and unscrutinized immune entities of the zebrafish gut

open access: yesFEBS Letters, EarlyView.
Understudied cells of the zebrafish immune system include bona fide immune cells and epithelial (‐derived) cells with immune functions. Research focusing on zebrafish cells which demonstrate similarities to mammalian immune cell counterparts may help us understand the pathologies in which they are implicated. Currently available and advanced tools make
Audrey Inge Schytz Andersen‐Civil   +5 more
wiley   +1 more source

A Lossless Layered-Based Non-Encoding Plain Text Compression and Encryption Algorithm Utilizing Binary Fragmentation and Defragmentation Technique

open access: yesIEEE Access
This paper proposes an innovative fusion of encryption and compression techniques that optimizes data handling and security. The approach employs a layered non-encoding encryption-compression algorithm DQRc (Data in Quick Response Code) that attempts to ...
Pratham Mishra   +4 more
doaj   +1 more source

From lactation to malignancy: A comparison between healthy and cancerous breast gland at single‐cell resolution reveals new issues for tumorigenesis

open access: yesFEBS Letters, EarlyView.
Single‐cell RNA sequencing reveals an opposite role of SLPI in basal tumors based on metastatic spread, along with shared activation of specific regulons in cancer cells and mature luminal lactocytes, as well as downregulation of MALAT1 and NEAT1 in the latter.
Pietro Ancona   +4 more
wiley   +1 more source

Protein kinase FAM20C—when subcellular localization matters

open access: yesFEBS Letters, EarlyView.
FAM20C is a Golgi‐resident kinase that phosphorylates proteins along the entire secretory pathway. The presence of potential FAM20C substrates in the cytoplasm or nucleus raises the question of how the kinase and its substrates encounter each other. Protein kinases achieve signaling specificity through consensus sequence recognition and subcellular ...
Francesca Noventa, Mauro Salvi
wiley   +1 more source

Cryptography: Mathematical Advancements on Cyber Security [PDF]

open access: yes, 2019
The origin of cryptography, the study of encoding and decoding messages, dates back to ancient times around 1900 BC. The ancient Egyptians enlisted the use of basic encryption techniques to conceal personal information.
Bower, Kristin
core   +1 more source

Home - About - Disclaimer - Privacy