Results 61 to 70 of about 459,845 (362)

A New Image Encryption Algorithm for Grey and Color Medical Images

open access: yesIEEE Access, 2021
Recently, diagnosing diseases using medical images became crucial. As these images are transmitted through the network, they need a high level of protection. If the data in these images are liable for unauthorized usage, this may lead to severe problems.
Sara T. Kamal   +4 more
semanticscholar   +1 more source

Single‐cell insights into the role of T cells in B‐cell malignancies

open access: yesFEBS Letters, EarlyView.
Single‐cell technologies have transformed our understanding of T cell–tumor cell interactions in B‐cell malignancies, revealing new T‐cell subsets, functional states, and immune evasion mechanisms. This Review synthesizes these findings, highlighting the roles of T cells in pathogenesis, progression, and therapy response, and underscoring their ...
Laura Llaó‐Cid
wiley   +1 more source

Performance evaluations of AI-based obfuscated and encrypted malicious script detection with feature optimization

open access: yesETRI Journal
In the digital security environment, the obfuscation and encryption of mali-cious scripts are primary attack methods used to evade detection. Thesescripts—easily spread through websites, emails, and file downloads—can beautomatically executed on users ...
Kookjin Kim   +3 more
doaj   +1 more source

Encryption of a Message by HillAli Cipher and Security of Routing Path by DSR in Wireless Sensor Network

open access: yesJournal of Communications Software and Systems
A Wireless Sensor Network (WSN) is a collection of sensors that communicate or track a specific object. It is used in many fields of war, architecture, or espionage, but the wireless sensor network faces challenges in securing the path or the message ...
Haneen Mohammed Hussein   +2 more
doaj   +1 more source

Using Blockchain to Ensure Trust between Donor Agencies and NGOs in Under-Developed Countries

open access: yesComputers, 2021
Non-governmental organizations (NGOs) in under-developed countries are receiving funds from donor agencies for various purposes, including relief from natural disasters and other emergencies, promoting education, women empowerment, economic development ...
Ehsan Rehman   +5 more
doaj   +1 more source

A New Algorithm for Digital Image Encryption Based on Chaos Theory

open access: yesEntropy, 2021
In recent decades, image encryption, as one of the significant information security fields, has attracted many researchers and scientists. However, several studies have been performed with different methods, and novel and useful algorithms have been ...
Y. Pourasad   +2 more
semanticscholar   +1 more source

IoT data encryption algorithm for security [PDF]

open access: yes, 2020
This research project is about encryption simulation for IoT data. It is important to enhance the security system when sending and receiving the IoT data.
Kanaan Ismael, Marwan
core  

Biological and technical complexities in analyzing extracellular vesicle immune interactions in B‐cell malignancies

open access: yesFEBS Letters, EarlyView.
Extracellular vesicles (EVs) mediate intercellular communication in tumor immune microenvironments. However, their role in B‐cell malignancies remains poorly defined, owing to biological complexity and technical challenges in EV isolation and analysis.
Daniel Bachurski, Michael Hallek
wiley   +1 more source

An Enhanced Cloud Network Integrity and Fair Compensation Scheme Through Data Structures and Blockchain Enforcement

open access: yesEng
The expansion of cloud-based storage has intensified concerns about integrity, security, and fair compensation for third-party auditors. Existing authentication methods often compromise privacy with high computational costs, punctuating the need for an ...
Renato Racelis Maaliw
doaj   +1 more source

Physical Layer Authenticated Image Encryption for IoT Network Based on Biometric Chaotic Signature for MPFrFT OFDM System

open access: yesSensors, 2023
In this paper, a new physical layer authenticated encryption (PLAE) scheme based on the multi-parameter fractional Fourier transform–Orthogonal frequency division multiplexing (MP-FrFT-OFDM) is suggested for secure image transmission over the IoT network.
Esam A. A. Hagras   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy