Results 51 to 60 of about 459,845 (362)
A Novel Latin Square Image Cipher
In this paper, we introduce a symmetric-key Latin square image cipher (LSIC) for grayscale and color images. Our contributions to the image encryption community include 1) we develop new Latin square image encryption primitives including Latin Square ...
Aaronson +45 more
core +1 more source
Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security [PDF]
Recently, a variant of proxy re-encryption, named conditional proxy re-encryption (C-PRE), has been introduced. Compared with traditional proxy re-encryption, C-PRE enables the delegator to implement fine-grained delegation of decryption rights, and thus
B. Libert +15 more
core +5 more sources
B cells sense external mechanical forces and convert them into biochemical signals through mechanotransduction. Understanding how malignant B cells respond to physical stimuli represents a groundbreaking area of research. This review examines the key mechano‐related molecules and pathways in B lymphocytes, highlights the most relevant techniques to ...
Marta Sampietro +2 more
wiley +1 more source
Comparison of Mobile Transaction Security Using NFC and QR Codes
Mobile device transactions have become commonplace today. Quick-response (QR) codes and near-field communication (NFC) are popular cashless and contactless payment methods. These two payments have their characteristics.
Lucia Nugraheni Harnaningrum +1 more
doaj +1 more source
An approach for the cryptographic security enhancement of encryption is proposed and analyzed. The enhancement is based on the employment of a coding scheme and degradation of the ciphertext.
Miodrag J. Mihaljević +2 more
doaj +1 more source
Block encryption of quantum messages [PDF]
In modern cryptography, block encryption is a fundamental cryptographic primitive. However, it is impossible for block encryption to achieve the same security as one-time pad.
Liang, Min, Yang, Li
core +1 more source
AES-CBC Software Execution Optimization
With the proliferation of high-speed wireless networking, the necessity for efficient, robust and secure encryption modes is ever increasing. But, cryptography is primarily a computationally intensive process.
Doma, Jayramsingh +2 more
core +1 more source
Evolutionary interplay between viruses and R‐loops
Viruses interact with specialized nucleic acid structures called R‐loops to influence host transcription, epigenetic states, latency, and immune evasion. This Perspective examines the roles of R‐loops in viral replication, integration, and silencing, and how viruses co‐opt or avoid these structures.
Zsolt Karányi +4 more
wiley +1 more source
SEPCVN: Secure and Efficient Protocol for Cloud Vehicular Networking
Cloud vehicular networking is a relatively new inter-vehicle communication paradigm. The ability of cloud vehicular networking to address critical safety issues in road traffic is highly rated by operators.
Vinod Kumar +5 more
doaj +1 more source
Concisely Indexed Multi-Keyword Rank Search on Encrypted Cloud Documents
With the advent of cloud computing, the low-cost and high-capacity cloud storages have attracted people to move their data from local computers to the remote facilities.
Tai-Lin Chin, Wan-Ni Shih
doaj +1 more source

