Results 71 to 80 of about 299,742 (318)
Generalization of RSA cryptosystem based on 2n primes
This article introduced a new generalized RSA crypto-system based on $ 2n $ prime numbers called generalized RSA (GRSA). This is a modern technique to provide supreme security for the computer world by factoring the variable$ N $, where its analysis ...
Tariq Shah+4 more
doaj +1 more source
Single‐cell insights into the role of T cells in B‐cell malignancies
Single‐cell technologies have transformed our understanding of T cell–tumor cell interactions in B‐cell malignancies, revealing new T‐cell subsets, functional states, and immune evasion mechanisms. This Review synthesizes these findings, highlighting the roles of T cells in pathogenesis, progression, and therapy response, and underscoring their ...
Laura Llaó‐Cid
wiley +1 more source
Machine Learning in Chaos-Based Encryption: Theory, Implementations, and Applications
Chaos-based encryption is a promising approach to secure communication due to its complexity and unpredictability. However, various challenges lie in the design and implementation of efficient, low-power, attack-resistant chaos-based encryption schemes ...
Jinha Hwang+7 more
doaj +1 more source
A political, performative and affective landscape is revealed in this chapter as a way of approaching the topic of performing the digital: from the macro of the upheaval caused by Edward Snowden’s revelations of mass data surveillance to the micro of a phenomenological account of a crisis following an artistic performance using mobile media ...
openaire +2 more sources
Victims and witnesses of cybercrime often hesitate to report incidents due to concerns over privacy, complexity, and fear of retaliation. Traditional reporting mechanisms require manual data entry, creating accessibility barriers and delaying response ...
Amir Aboubakr Shaker Mahmoud+2 more
doaj +1 more source
Security of the data transmission in the industrial control system [PDF]
The theme of this paper is to present the data transmission security system between the stations of the industrial control system. The possible options for secure communications between process stations, as well as between process and operator station ...
Marcin Bednarek, Tadeusz Dąbrowski
doaj +1 more source
In the adult T‐cell leukemia/lymphoma (ATL) cell line ED, the human T‐cell leukemia virus type 1 (HTLV‐1) provirus was integrated into the intron of the ift81 gene in the antisense orientation. Despite this integration, both the intact ift81 and the viral oncogene hbz were simultaneously expressed, likely due to the functional insufficiency of viral ...
Mayuko Yagi+5 more
wiley +1 more source
Personal Data Security: Divergent Standards in the European Union and the United States [PDF]
This Note argues that the U.S. Government should discontinue all attempts to establish EES as the de facto encryption standard in the United States because the economic disadvantages associated with widespread implementation of EES outweigh the ...
Fleischmann, Amy
core +1 more source
Cyclic nucleotide signaling as a drug target in retinitis pigmentosa
Disruptions in cGMP and cAMP signaling can contribute to retinal dysfunction and photoreceptor loss in retinitis pigmentosa. This perspective examines the mechanisms and evaluates emerging evidence on targeting these pathways as a potential therapeutic strategy to slow or prevent retinal degeneration.
Katri Vainionpää+2 more
wiley +1 more source
On Compressing Encrypted Data without the Encryption Key [PDF]
When it is desired to transmit redundant data over an insecure and bandwidth-constrained channel, it is customary to first compress the redundant data and then encrypt it for security reasons. In this paper, we investigate the novelty of reversing the order of these steps, i.e. first encrypting and then compressing.
Johnson, Mark+2 more
openaire +3 more sources