Results 41 to 50 of about 299,742 (318)

Reversible AMBTC-Based Data Hiding With Security Improvement by Chaotic Encryption

open access: yesIEEE Access, 2019
Social networking and cloud computing are being extensively used, and in this era, the frequency of sending information or images to each other is increasing. The prevention of private information leakage during communication over the Internet has become
Hsiang-Ying Wang   +4 more
doaj   +1 more source

Secure Fully Homomorphic Authenticated Encryption

open access: yesIEEE Access, 2021
Homomorphic authenticated encryption allows implicit computation on plaintexts using corresponding ciphertexts without losing privacy, and provides authenticity of the computation and the resultant plaintext of the computation when performing a ...
Jeongsu Kim, Aaram Yun
doaj   +1 more source

AUTOMATING THE DATA SECURITY PROCESS [PDF]

open access: yesJournal of Defense Resources Management, 2017
Contemporary organizations face big data security challenges in the cyber environment due to modern threats and actual business working model which relies heavily on collaboration, data sharing, tool integration, increased mobility, etc.
Florin Ogigau-Neamtiu
doaj  

Implementasi Algoritma Kriptografi RSA untuk Enkripsi dan Dekripsi Email

open access: yesJurnal Teknologi dan Sistem Komputer, 2015
In the world of Internet nothing is really safe. There's always a gap in any application made. Likewise in email delivery. To minimize attacks on the data transmission is usually applied cryptography.
Albert Ginting   +2 more
doaj   +1 more source

Insights into PI3K/AKT signaling in B cell development and chronic lymphocytic leukemia

open access: yesFEBS Letters, EarlyView.
This Review explores how the phosphoinositide 3‐kinase and protein kinase B pathway shapes B cell development and drives chronic lymphocytic leukemia, a common blood cancer. It examines how signaling levels affect disease progression, addresses treatment challenges, and introduces novel experimental strategies to improve therapies and patient outcomes.
Maike Buchner
wiley   +1 more source

Searchable Encryption to Reduce Encryption Degradation in Adjustably Encrypted Databases

open access: yes, 2017
Processing queries on encrypted data protects sensitive data stored in cloud databases. CryptDB has introduced the approach of adjustable encryption for such processing. A database column is adjusted to the necessary level of encryption, e.g. order-preserving, for the set of executed queries, but never reversed.
Florian Kerschbaum, Martin Härterich
openaire   +3 more sources

The Myth of Superiority of American Encryption Products [PDF]

open access: yes, 1998
Encryption software and hardware use sophisticated mathematical algorithms to encipher a message so that only the intended recipient may read it. Fearing that criminals and terrorists will use encryption to evade authorities, the United States now ...
Henry B. Wolfe
core  

Cryptanalysis of an MPEG-Video Encryption Scheme Based on Secret Huffman Tables [PDF]

open access: yes, 2007
This paper studies the security of a recently-proposed MPEG-video encryption scheme based on secret Huffman tables. Our cryptanalysis shows that: 1) the key space of the encryption scheme is not sufficiently large against divide-and-conquer (DAC) attack ...
A. Uhl   +10 more
core   +3 more sources

Data Security Protection in Cloud Computing by using Encryption [PDF]

open access: yesKirkuk Journal of Science, 2017
Cloud computing is a paradigm for offer information technology services on the Internet, such as hardware, software, networking and also the storage can be accessed anywhere at any time on a pay-per-use basis.
Asst. Lec. Ghassan Sabeeh Mahmood
doaj   +1 more source

Making tau amyloid models in vitro: a crucial and underestimated challenge

open access: yesFEBS Letters, EarlyView.
This review highlights the challenges of producing in vitro amyloid assemblies of the tau protein. We review how accurately the existing protocols mimic tau deposits found in the brain of patients affected with tauopathies. We discuss the important properties that should be considered when forming amyloids and the benchmarks that should be used to ...
Julien Broc, Clara Piersson, Yann Fichou
wiley   +1 more source

Home - About - Disclaimer - Privacy