Results 61 to 70 of about 404,295 (388)
IIBE: An Improved Identity-Based Encryption Algorithm for WSN Security
Wireless sensor networks (WSN) have problems such as limited power, weak computing power, poor communication ability, and vulnerability to attack. However, the existing encryption methods cannot effectively solve the above problems when applied to WSN ...
Chun Cao+4 more
semanticscholar +1 more source
Processing Encrypted Data Using Homomorphic Encryption
Fully Homomorphic Encryption (FHE) was initially introduced as a concept shortly after the development of the RSA cryptosystem, by Rivest et al. [54]. Although long sought after, the first functional scheme was only proposed over thirty years later by Gentry [34, 35] in 2009. The same blueprint to construct FHE has been followed in all subsequent work.
Barnett, Anthony+14 more
openaire +4 more sources
SDR Implementation of a D2D Security Cryptographic Mechanism
Device-to-device (D2D) communication represents a promising technique to enable devices to communicate directly without the interaction of access points or base stations. The ad hoc and proximity nature of this communication introduce some very important
Titus Balan+2 more
doaj +1 more source
Using encryption for authentication in large networks of computers
Use of encryption to achieve authenticated communication in computer networks is discussed. Example protocols are presented for the establishment of authenticated connections, for the management of authenticated mail, and for signature verification and ...
R. Needham, M. D. Schroeder
semanticscholar +1 more source
The Myth of Superiority of American Encryption Products [PDF]
Encryption software and hardware use sophisticated mathematical algorithms to encipher a message so that only the intended recipient may read it. Fearing that criminals and terrorists will use encryption to evade authorities, the United States now ...
Henry B. Wolfe
core
In vivo IL‐10 produced by tissue‐resident tolDC is involved in maintaining/inducing tolerance. Depending on the agent used for ex vivo tolDC generation, cells acquire common features but prime T cells towards anergy, FOXP3+ Tregs, or Tr1 cells according to the levels of IL‐10 produced. Ex vivo‐induced tolDC were administered to patients to re‐establish/
Konstantina Morali+3 more
wiley +1 more source
Dual-Layer Video Encryption using RSA Algorithm [PDF]
This paper proposes a video encryption algorithm using RSA and Pseudo Noise (PN) sequence, aimed at applications requiring sensitive video information transfers. The system is primarily designed to work with files encoded using the Audio Video Interleaved (AVI) codec, although it can be easily ported for use with Moving Picture Experts Group (MPEG ...
arxiv +1 more source
A New Image Encryption Algorithm for Grey and Color Medical Images
Recently, diagnosing diseases using medical images became crucial. As these images are transmitted through the network, they need a high level of protection. If the data in these images are liable for unauthorized usage, this may lead to severe problems.
Sara T. Kamal+4 more
semanticscholar +1 more source
Robust Encryption, Extended [PDF]
Robustness is a notion often tacitly assumed while working with encrypted data. Roughly speaking, it states that a ciphertext cannot be decrypted under different keys. Initially formalized in a public-key context, it has been further extended to key-encapsulation mechanisms, and more recently to pseudorandom functions, message-authentication codes and ...
Géraud, Rémi+2 more
openaire +5 more sources
FoxO1 signaling in B cell malignancies and its therapeutic targeting
FoxO1 has context‐specific tumor suppressor or oncogenic character in myeloid and B cell malignancies. This includes tumor‐promoting properties such as stemness maintenance and DNA damage tolerance in acute leukemias, or regulation of cell proliferation and survival, or migration in mature B cell malignancies.
Krystof Hlavac+3 more
wiley +1 more source