Results 121 to 130 of about 230,478 (367)

A simple encryption algorithm [PDF]

open access: yes, 2017
In this paper I present a Simple Encryption Algorithm (SEAL), by which 128-bit long blocks can be quickly encrypted/decrypted. The algorithm is designed to run efficiently in software without any specialized hardware while still guaranteeing a strong degree of confidentiality.
openaire   +1 more source

Clinical significance of stratifying prostate cancer patients through specific circulating genes

open access: yesMolecular Oncology, EarlyView.
We tested a specific panel of genes representative of luminal, neuroendocrine and stem‐like cells in the blood of prostate cancer patients, showing predictive value from diagnosis to late stages of disease. This approach allows monitoring of treatment responses and outcomes at specific time points in trajectories.
Seta Derderian   +12 more
wiley   +1 more source

An Elgamal Encryption Scheme of Fibonacci Q-Matrix and Finite State Machine

open access: yesJournal of Applied Computer Science & Mathematics, 2015
Cryptography is the science of writing messages in unknown form using mathematical models. In Cryptography, several ciphers were introduced for the encryption schemes.
B. Ravi Kumar   +2 more
doaj  

Prevention of Crypto-Ransomware Using a Pre-Encryption Detection Algorithm

open access: yesComputers, 2019
Ransomware is a relatively new type of intrusion attack, and is made with the objective of extorting a ransom from its victim. There are several types of ransomware attacks, but the present paper focuses only upon the crypto-ransomware, because it makes ...
S. H. Kok   +3 more
doaj   +1 more source

MET variants with activating N‐lobe mutations identified in hereditary papillary renal cell carcinomas still require ligand stimulation

open access: yesMolecular Oncology, EarlyView.
MET variants in the N‐lobe of the kinase domain, found in hereditary papillary renal cell carcinoma, require ligand stimulation to promote cell transformation, in contrast to other RTK variants. This suggests that HGF expression in the microenvironment is important for tumor growth in such patients. Their sensitivity to MET inhibitors opens the way for
Célia Guérin   +14 more
wiley   +1 more source

Deniable Functional Encryption [PDF]

open access: yes, 2016
Deniable encryption, first introduced by Canetti et al. [14], allows a sender and/or receiver of encrypted communication to produce fake but authentic-looking coins and/or secret keys that "open" the communication to a different message. Here we initiate its study for the more general case of functional encryption FE, as introduced by Boneh et al. [12],
De Caro A., Iovino V., O'Neill A.
openaire   +2 more sources

Respiratory complex I‐mediated NAD+ regeneration regulates cancer cell proliferation through the transcriptional and translational control of p21Cip1 expression by SIRT3 and SIRT7

open access: yesMolecular Oncology, EarlyView.
NAD+ regeneration by mitochondrial complex I NADH dehydrogenase is important for cancer cell proliferation. Specifically, NAD+ is necessary for the activities of NAD+‐dependent deacetylases SIRT3 and SIRT7, which suppress the expression of p21Cip1 cyclin‐dependent kinase inhibitor, an antiproliferative molecule, at the translational and transcriptional
Masato Higurashi   +5 more
wiley   +1 more source

Entropy Analysis and Image Encryption Application Based on a New Chaotic System Crossing a Cylinder

open access: yesEntropy, 2019
Designing chaotic systems with specific features is a hot topic in nonlinear dynamics. In this study, a novel chaotic system is presented with a unique feature of crossing inside and outside of a cylinder repeatedly.
Alaa Kadhim Farhan   +4 more
doaj   +1 more source

CryptGraph: Privacy Preserving Graph Analytics on Encrypted Graph [PDF]

open access: yesarXiv, 2014
Many graph mining and analysis services have been deployed on the cloud, which can alleviate users from the burden of implementing and maintaining graph algorithms. However, putting graph analytics on the cloud can invade users' privacy. To solve this problem, we propose CryptGraph, which runs graph analytics on encrypted graph to preserve the privacy ...
arxiv  

Home - About - Disclaimer - Privacy