Results 51 to 60 of about 459,845 (362)

A Novel Latin Square Image Cipher

open access: yes, 2012
In this paper, we introduce a symmetric-key Latin square image cipher (LSIC) for grayscale and color images. Our contributions to the image encryption community include 1) we develop new Latin square image encryption primitives including Latin Square ...
Aaronson   +45 more
core   +1 more source

Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security [PDF]

open access: yes, 2009
Recently, a variant of proxy re-encryption, named conditional proxy re-encryption (C-PRE), has been introduced. Compared with traditional proxy re-encryption, C-PRE enables the delegator to implement fine-grained delegation of decryption rights, and thus
B. Libert   +15 more
core   +5 more sources

B cell mechanobiology in health and disease: emerging techniques and insights into therapeutic responses

open access: yesFEBS Letters, EarlyView.
B cells sense external mechanical forces and convert them into biochemical signals through mechanotransduction. Understanding how malignant B cells respond to physical stimuli represents a groundbreaking area of research. This review examines the key mechano‐related molecules and pathways in B lymphocytes, highlights the most relevant techniques to ...
Marta Sampietro   +2 more
wiley   +1 more source

Comparison of Mobile Transaction Security Using NFC and QR Codes

open access: yesJurnal Nasional Teknik Elektro dan Teknologi Informasi
Mobile device transactions have become commonplace today. Quick-response (QR) codes and near-field communication (NFC) are popular cashless and contactless payment methods. These two payments have their characteristics.
Lucia Nugraheni Harnaningrum   +1 more
doaj   +1 more source

An Approach for Security Enhancement of Certain Encryption Schemes Employing Error Correction Coding and Simulated Synchronization Errors

open access: yesEntropy, 2022
An approach for the cryptographic security enhancement of encryption is proposed and analyzed. The enhancement is based on the employment of a coding scheme and degradation of the ciphertext.
Miodrag J. Mihaljević   +2 more
doaj   +1 more source

Block encryption of quantum messages [PDF]

open access: yes, 2018
In modern cryptography, block encryption is a fundamental cryptographic primitive. However, it is impossible for block encryption to achieve the same security as one-time pad.
Liang, Min, Yang, Li
core   +1 more source

AES-CBC Software Execution Optimization

open access: yes, 2012
With the proliferation of high-speed wireless networking, the necessity for efficient, robust and secure encryption modes is ever increasing. But, cryptography is primarily a computationally intensive process.
Doma, Jayramsingh   +2 more
core   +1 more source

Evolutionary interplay between viruses and R‐loops

open access: yesFEBS Letters, EarlyView.
Viruses interact with specialized nucleic acid structures called R‐loops to influence host transcription, epigenetic states, latency, and immune evasion. This Perspective examines the roles of R‐loops in viral replication, integration, and silencing, and how viruses co‐opt or avoid these structures.
Zsolt Karányi   +4 more
wiley   +1 more source

SEPCVN: Secure and Efficient Protocol for Cloud Vehicular Networking

open access: yesIEEE Access
Cloud vehicular networking is a relatively new inter-vehicle communication paradigm. The ability of cloud vehicular networking to address critical safety issues in road traffic is highly rated by operators.
Vinod Kumar   +5 more
doaj   +1 more source

Concisely Indexed Multi-Keyword Rank Search on Encrypted Cloud Documents

open access: yesApplied Sciences, 2021
With the advent of cloud computing, the low-cost and high-capacity cloud storages have attracted people to move their data from local computers to the remote facilities.
Tai-Lin Chin, Wan-Ni Shih
doaj   +1 more source

Home - About - Disclaimer - Privacy