Results 61 to 70 of about 478,748 (354)
Implementation and Performance of Lightweight Authentication Encryption ASCON on IoT Devices
The Internet of Things (IoT) is growing rapidly, enabling interconnected devices to communicate and share data seamlessly. While this expansion drives significant advancements across industries, it also introduces critical challenges in ensuring secure ...
Gabriela Cagua +2 more
doaj +1 more source
An approach for the cryptographic security enhancement of encryption is proposed and analyzed. The enhancement is based on the employment of a coding scheme and degradation of the ciphertext.
Miodrag J. Mihaljević +2 more
doaj +1 more source
AES-CBC Software Execution Optimization
With the proliferation of high-speed wireless networking, the necessity for efficient, robust and secure encryption modes is ever increasing. But, cryptography is primarily a computationally intensive process.
Doma, Jayramsingh +2 more
core +1 more source
A novel original procedure of encryption/decryption based on the polyadic algebraic structures and on signal processing methods is proposed. First, we use signals with integer amplitudes to send information. Then, we use polyadic techniques to transfer the plaintext into series of special integers.
Steven Duplij, Qiang Guo
openaire +2 more sources
Reciprocal control of viral infection and phosphoinositide dynamics
Phosphoinositides, although scarce, regulate key cellular processes, including membrane dynamics and signaling. Viruses exploit these lipids to support their entry, replication, assembly, and egress. The central role of phosphoinositides in infection highlights phosphoinositide metabolism as a promising antiviral target.
Marie Déborah Bancilhon, Bruno Mesmin
wiley +1 more source
Comparison of Mobile Transaction Security Using NFC and QR Codes
Mobile device transactions have become commonplace today. Quick-response (QR) codes and near-field communication (NFC) are popular cashless and contactless payment methods. These two payments have their characteristics.
Lucia Nugraheni Harnaningrum +1 more
doaj +1 more source
Concisely Indexed Multi-Keyword Rank Search on Encrypted Cloud Documents
With the advent of cloud computing, the low-cost and high-capacity cloud storages have attracted people to move their data from local computers to the remote facilities.
Tai-Lin Chin, Wan-Ni Shih
doaj +1 more source
Block encryption of quantum messages [PDF]
In modern cryptography, block encryption is a fundamental cryptographic primitive. However, it is impossible for block encryption to achieve the same security as one-time pad.
Liang, Min, Yang, Li
core +1 more source
Fluorescent probes allow dynamic visualization of phosphoinositides in living cells (left), whereas mass spectrometry provides high‐sensitivity, isomer‐resolved quantitation (right). Their synergistic use captures complementary aspects of lipid signaling. This review illustrates how these approaches reveal the spatiotemporal regulation and quantitative
Hiroaki Kajiho +3 more
wiley +1 more source
SEPCVN: Secure and Efficient Protocol for Cloud Vehicular Networking
Cloud vehicular networking is a relatively new inter-vehicle communication paradigm. The ability of cloud vehicular networking to address critical safety issues in road traffic is highly rated by operators.
Vinod Kumar +5 more
doaj +1 more source

