Results 71 to 80 of about 404,295 (388)
The Internet of Things (IoT) can includes many resource-constrained devices, with most usually needing to securely communicate with their network managers, which are more resource-rich devices in the IoT network.
Sarmadullah Khan+4 more
doaj +1 more source
A multi-level approach with visual information for encrypted H.265/HEVC videos [PDF]
High-efficiency video coding (HEVC) encryption has been proposed to encrypt syntax elements for the purpose of video encryption. To achieve high video security, to the best of our knowledge, almost all of the existing HEVC encryption algorithms mainly encrypt the whole video, such that the user without permissions cannot obtain any viewable information.
arxiv
Enhancing Selective Encryption for H.264/AVC Using Advanced Encryption Standard [PDF]
Multimedia information availability has increased dramatically with the advent of mobile devices. but with this availability comes problems of maintaining the security of information that is displayed in public. Many approaches have been used or proposed for providing security for information dissemination over networks, protection system classified ...
arxiv
Persistent issues in encryption software: A heuristic and cognitive walkthrough [PDF]
The support information accompanying security software can be difficult to understand by end-users, who have little knowledge in cyber security.
El-Abed, Jad, Szewczyk, Patryk S
core +1 more source
Insights into PI3K/AKT signaling in B cell development and chronic lymphocytic leukemia
This Review explores how the phosphoinositide 3‐kinase and protein kinase B pathway shapes B cell development and drives chronic lymphocytic leukemia, a common blood cancer. It examines how signaling levels affect disease progression, addresses treatment challenges, and introduces novel experimental strategies to improve therapies and patient outcomes.
Maike Buchner
wiley +1 more source
Fully Homomorphic Encryption via Affine Automorphisms [PDF]
Homomorphic encryption is a method used in cryptopgraphy to create programs that can interact with encrypted data without ever leaving the data in the clear. This has many potential applications in cybersecurity. This paper uses automorphisms of affine space to create a form of homomorphic encryption for straight line programs.
arxiv
The importance of image security in the field of medical imaging is challenging. Several research works have been conducted to secure medical healthcare images. Encryption, not risking loss of data, is the right solution for image confidentiality. Due to
M. Hasan+10 more
semanticscholar +1 more source
Searchable Encryption to Reduce Encryption Degradation in Adjustably Encrypted Databases
Processing queries on encrypted data protects sensitive data stored in cloud databases. CryptDB has introduced the approach of adjustable encryption for such processing. A database column is adjusted to the necessary level of encryption, e.g. order-preserving, for the set of executed queries, but never reversed.
Florian Kerschbaum, Martin Härterich
openaire +3 more sources
Order-Revealing Encryption and the Hardness of Private Learning [PDF]
An order-revealing encryption scheme gives a public procedure by which two ciphertexts can be compared to reveal the ordering of their underlying plaintexts. We show how to use order-revealing encryption to separate computationally efficient PAC learning
A Beimel+27 more
core +2 more sources
Diphthamide synthesis is linked to the eEF2‐client chaperone machinery
The diphthamide modification of eukaryotic translation elongation factor 2 (eEF2) is important for accurate protein synthesis. We addressed the potential coordination of de novo eEF2 synthesis with simultaneous or subsequent diphthamide modification. Our work reveals that the co‐chaperones Hgh1 and Cpr7, which are known to support folding of nascent ...
Lars Kaduhr+4 more
wiley +1 more source