Results 191 to 200 of about 478,748 (354)
Using encryption for authentication in large networks of computers
R. Needham, M. D. Schroeder
semanticscholar +1 more source
Role-Attribute-Based Encryption (RABE) Access Control for Healthcare Cloud Systems [PDF]
Paolina Centonze
openalex +1 more source
Lightweight image encryption for wireless sensor networks using optimized elliptic curve and fuzzy logic. [PDF]
Zarei M +3 more
europepmc +1 more source
A Novel Paradigm in Authentication System Using Swifi Encryption /Decryption Approach
Shadi R. Masadeh +4 more
openalex +1 more source
Chemoresistance in bladder cancer: Macrophage recruitment associated with CXCL1, CXCL5 and CXCL8 expression is characteristic of Gemcitabine/Cisplatin (Gem/Cis) Non‐Responder tumors (right side) while Responder tumors did not show substantial tumor‐stromal crosstalk (left side). All biological icons are attributed to Bioicons: carcinoma, cancerous‐cell‐
Sophie Leypold +11 more
wiley +1 more source
Hyperchaos and the fusion of Moore's automaton with gold sequences for augmented medical image encryption. [PDF]
Gabr M +5 more
europepmc +1 more source
The role of lipid metabolism in neuronal senescence
Disrupted lipid metabolism, through alterations in lipid species or lipid droplet accumulation, can drive neuronal senescence. However, lipid dyshomeostasis can also occur alongside neuronal senescence, further amplifying tissue damage. Delineating how lipid‐induced senescence emerges in neurons and glial cells, and how it contributes to ageing and ...
Dikaia Tsagkari +2 more
wiley +1 more source
A novel color images security-based on SPN over the residue classes of quaternion integers [Formula: see text]. [PDF]
Sajjad M, Alqwaifly NA.
europepmc +1 more source
Cosine-transform-based chaotic system for image encryption
Zhongyun Hua, Yicong Zhou, Hejiao Huang
semanticscholar +1 more source

