Results 121 to 130 of about 478,748 (354)
Security enhancement for A5/1 without losing hardware efficiency in future mobile systems [PDF]
A5/1 is the strong encryption algorithm which protects the air interface of the GSM cellular network. However, in the Fast Software Encryption Workshop 2000 two attacks, the biased birthday attack and the random subgraph attack against A5/1 were ...
Honary, B., Komninos, N.
core
We reconstituted Synechocystis glycogen synthesis in vitro from purified enzymes and showed that two GlgA isoenzymes produce glycogen with different architectures: GlgA1 yields denser, highly branched glycogen, whereas GlgA2 synthesizes longer, less‐branched chains.
Kenric Lee +3 more
wiley +1 more source
EAEBHCM:an extended attribute encryption based hidden credentials model
The identity-based encryption based hidden credentials has three problems that it can not supports 1-N communication,endures no identity fuzzy and lefts open to conspiracy crack.An extended attribute encryption based hidden credentials model(EAEBHCM) was
Wei-jin GE, Xiao-hui HU
doaj
Victims and witnesses of cybercrime often hesitate to report incidents due to concerns over privacy, complexity, and fear of retaliation. Traditional reporting mechanisms require manual data entry, creating accessibility barriers and delaying response ...
Amir Aboubakr Shaker Mahmoud +2 more
doaj +1 more source
Cryptography: Mathematical Advancements on Cyber Security [PDF]
The origin of cryptography, the study of encoding and decoding messages, dates back to ancient times around 1900 BC. The ancient Egyptians enlisted the use of basic encryption techniques to conceal personal information.
Bower, Kristin
core +1 more source
This study explores salivary RNA for breast cancer (BC) diagnosis, prognosis, and follow‐up. High‐throughput RNA sequencing identified distinct salivary RNA signatures, including novel transcripts, that differentiate BC from healthy controls, characterize histological and molecular subtypes, and indicate lymph node involvement.
Nicholas Rajan +9 more
wiley +1 more source
Implementation of shared file encrypted storage hierarchical access control scheme
The traditional file sharing way is single,lack of security,and the shared file's permission autonomous control is too high.To solve these problems,a file encrypted storage and hierarchical access control scheme was proposed.Through increasing ...
Li LI +3 more
doaj
Small Pseudo-Random Families of Matrices: Derandomizing Approximate Quantum Encryption
A quantum encryption scheme (also called private quantum channel, or state randomization protocol) is a one-time pad for quantum messages. If two parties share a classical random string, one of them can transmit a quantum state to the other so that an ...
Ambainis, Andris, Smith, Adam
core +2 more sources
A‐to‐I editing of miRNAs, particularly miR‐200b‐3p, contributes to HGSOC progression by enhancing cancer cell proliferation, migration and 3D growth. The edited form is linked to poorer patient survival and the identification of novel molecular targets.
Magdalena Niemira +14 more
wiley +1 more source
Time based incremental backup scheme for mobile cloud computing
A time-based data secure backup mechanism for moving the cloud was presented.Time was considered as a parameter into the data encryption for the important information in mobile device and backups the users' data ac-cording to the time period.It had not ...
Yun-fei CI +5 more
doaj

