Results 61 to 70 of about 459,845 (362)
A New Image Encryption Algorithm for Grey and Color Medical Images
Recently, diagnosing diseases using medical images became crucial. As these images are transmitted through the network, they need a high level of protection. If the data in these images are liable for unauthorized usage, this may lead to severe problems.
Sara T. Kamal +4 more
semanticscholar +1 more source
Single‐cell insights into the role of T cells in B‐cell malignancies
Single‐cell technologies have transformed our understanding of T cell–tumor cell interactions in B‐cell malignancies, revealing new T‐cell subsets, functional states, and immune evasion mechanisms. This Review synthesizes these findings, highlighting the roles of T cells in pathogenesis, progression, and therapy response, and underscoring their ...
Laura Llaó‐Cid
wiley +1 more source
In the digital security environment, the obfuscation and encryption of mali-cious scripts are primary attack methods used to evade detection. Thesescripts—easily spread through websites, emails, and file downloads—can beautomatically executed on users ...
Kookjin Kim +3 more
doaj +1 more source
A Wireless Sensor Network (WSN) is a collection of sensors that communicate or track a specific object. It is used in many fields of war, architecture, or espionage, but the wireless sensor network faces challenges in securing the path or the message ...
Haneen Mohammed Hussein +2 more
doaj +1 more source
Using Blockchain to Ensure Trust between Donor Agencies and NGOs in Under-Developed Countries
Non-governmental organizations (NGOs) in under-developed countries are receiving funds from donor agencies for various purposes, including relief from natural disasters and other emergencies, promoting education, women empowerment, economic development ...
Ehsan Rehman +5 more
doaj +1 more source
A New Algorithm for Digital Image Encryption Based on Chaos Theory
In recent decades, image encryption, as one of the significant information security fields, has attracted many researchers and scientists. However, several studies have been performed with different methods, and novel and useful algorithms have been ...
Y. Pourasad +2 more
semanticscholar +1 more source
IoT data encryption algorithm for security [PDF]
This research project is about encryption simulation for IoT data. It is important to enhance the security system when sending and receiving the IoT data.
Kanaan Ismael, Marwan
core
Extracellular vesicles (EVs) mediate intercellular communication in tumor immune microenvironments. However, their role in B‐cell malignancies remains poorly defined, owing to biological complexity and technical challenges in EV isolation and analysis.
Daniel Bachurski, Michael Hallek
wiley +1 more source
The expansion of cloud-based storage has intensified concerns about integrity, security, and fair compensation for third-party auditors. Existing authentication methods often compromise privacy with high computational costs, punctuating the need for an ...
Renato Racelis Maaliw
doaj +1 more source
In this paper, a new physical layer authenticated encryption (PLAE) scheme based on the multi-parameter fractional Fourier transform–Orthogonal frequency division multiplexing (MP-FrFT-OFDM) is suggested for secure image transmission over the IoT network.
Esam A. A. Hagras +3 more
doaj +1 more source

