Results 61 to 70 of about 478,748 (354)

Implementation and Performance of Lightweight Authentication Encryption ASCON on IoT Devices

open access: yesIEEE Access
The Internet of Things (IoT) is growing rapidly, enabling interconnected devices to communicate and share data seamlessly. While this expansion drives significant advancements across industries, it also introduces critical challenges in ensuring secure ...
Gabriela Cagua   +2 more
doaj   +1 more source

An Approach for Security Enhancement of Certain Encryption Schemes Employing Error Correction Coding and Simulated Synchronization Errors

open access: yesEntropy, 2022
An approach for the cryptographic security enhancement of encryption is proposed and analyzed. The enhancement is based on the employment of a coding scheme and degradation of the ciphertext.
Miodrag J. Mihaljević   +2 more
doaj   +1 more source

AES-CBC Software Execution Optimization

open access: yes, 2012
With the proliferation of high-speed wireless networking, the necessity for efficient, robust and secure encryption modes is ever increasing. But, cryptography is primarily a computationally intensive process.
Doma, Jayramsingh   +2 more
core   +1 more source

Polyadic Encryption

open access: yesAxioms
A novel original procedure of encryption/decryption based on the polyadic algebraic structures and on signal processing methods is proposed. First, we use signals with integer amplitudes to send information. Then, we use polyadic techniques to transfer the plaintext into series of special integers.
Steven Duplij, Qiang Guo
openaire   +2 more sources

Reciprocal control of viral infection and phosphoinositide dynamics

open access: yesFEBS Letters, EarlyView.
Phosphoinositides, although scarce, regulate key cellular processes, including membrane dynamics and signaling. Viruses exploit these lipids to support their entry, replication, assembly, and egress. The central role of phosphoinositides in infection highlights phosphoinositide metabolism as a promising antiviral target.
Marie Déborah Bancilhon, Bruno Mesmin
wiley   +1 more source

Comparison of Mobile Transaction Security Using NFC and QR Codes

open access: yesJurnal Nasional Teknik Elektro dan Teknologi Informasi
Mobile device transactions have become commonplace today. Quick-response (QR) codes and near-field communication (NFC) are popular cashless and contactless payment methods. These two payments have their characteristics.
Lucia Nugraheni Harnaningrum   +1 more
doaj   +1 more source

Concisely Indexed Multi-Keyword Rank Search on Encrypted Cloud Documents

open access: yesApplied Sciences, 2021
With the advent of cloud computing, the low-cost and high-capacity cloud storages have attracted people to move their data from local computers to the remote facilities.
Tai-Lin Chin, Wan-Ni Shih
doaj   +1 more source

Block encryption of quantum messages [PDF]

open access: yes, 2018
In modern cryptography, block encryption is a fundamental cryptographic primitive. However, it is impossible for block encryption to achieve the same security as one-time pad.
Liang, Min, Yang, Li
core   +1 more source

Spatiotemporal and quantitative analyses of phosphoinositides – fluorescent probe—and mass spectrometry‐based approaches

open access: yesFEBS Letters, EarlyView.
Fluorescent probes allow dynamic visualization of phosphoinositides in living cells (left), whereas mass spectrometry provides high‐sensitivity, isomer‐resolved quantitation (right). Their synergistic use captures complementary aspects of lipid signaling. This review illustrates how these approaches reveal the spatiotemporal regulation and quantitative
Hiroaki Kajiho   +3 more
wiley   +1 more source

SEPCVN: Secure and Efficient Protocol for Cloud Vehicular Networking

open access: yesIEEE Access
Cloud vehicular networking is a relatively new inter-vehicle communication paradigm. The ability of cloud vehicular networking to address critical safety issues in road traffic is highly rated by operators.
Vinod Kumar   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy