Results 71 to 80 of about 404,295 (388)

Resource Efficient Authentication and Session Key Establishment Procedure for Low-Resource IoT Devices

open access: yesIEEE Access, 2019
The Internet of Things (IoT) can includes many resource-constrained devices, with most usually needing to securely communicate with their network managers, which are more resource-rich devices in the IoT network.
Sarmadullah Khan   +4 more
doaj   +1 more source

A multi-level approach with visual information for encrypted H.265/HEVC videos [PDF]

open access: yesarXiv, 2020
High-efficiency video coding (HEVC) encryption has been proposed to encrypt syntax elements for the purpose of video encryption. To achieve high video security, to the best of our knowledge, almost all of the existing HEVC encryption algorithms mainly encrypt the whole video, such that the user without permissions cannot obtain any viewable information.
arxiv  

Enhancing Selective Encryption for H.264/AVC Using Advanced Encryption Standard [PDF]

open access: yesarXiv, 2022
Multimedia information availability has increased dramatically with the advent of mobile devices. but with this availability comes problems of maintaining the security of information that is displayed in public. Many approaches have been used or proposed for providing security for information dissemination over networks, protection system classified ...
arxiv  

Persistent issues in encryption software: A heuristic and cognitive walkthrough [PDF]

open access: yes, 2014
The support information accompanying security software can be difficult to understand by end-users, who have little knowledge in cyber security.
El-Abed, Jad, Szewczyk, Patryk S
core   +1 more source

Insights into PI3K/AKT signaling in B cell development and chronic lymphocytic leukemia

open access: yesFEBS Letters, EarlyView.
This Review explores how the phosphoinositide 3‐kinase and protein kinase B pathway shapes B cell development and drives chronic lymphocytic leukemia, a common blood cancer. It examines how signaling levels affect disease progression, addresses treatment challenges, and introduces novel experimental strategies to improve therapies and patient outcomes.
Maike Buchner
wiley   +1 more source

Fully Homomorphic Encryption via Affine Automorphisms [PDF]

open access: yesarXiv, 2020
Homomorphic encryption is a method used in cryptopgraphy to create programs that can interact with encrypted data without ever leaving the data in the clear. This has many potential applications in cybersecurity. This paper uses automorphisms of affine space to create a form of homomorphic encryption for straight line programs.
arxiv  

Lightweight Encryption Technique to Enhance Medical Image Security on Internet of Medical Things Applications

open access: yesIEEE Access, 2021
The importance of image security in the field of medical imaging is challenging. Several research works have been conducted to secure medical healthcare images. Encryption, not risking loss of data, is the right solution for image confidentiality. Due to
M. Hasan   +10 more
semanticscholar   +1 more source

Searchable Encryption to Reduce Encryption Degradation in Adjustably Encrypted Databases

open access: yes, 2017
Processing queries on encrypted data protects sensitive data stored in cloud databases. CryptDB has introduced the approach of adjustable encryption for such processing. A database column is adjusted to the necessary level of encryption, e.g. order-preserving, for the set of executed queries, but never reversed.
Florian Kerschbaum, Martin Härterich
openaire   +3 more sources

Order-Revealing Encryption and the Hardness of Private Learning [PDF]

open access: yes, 2015
An order-revealing encryption scheme gives a public procedure by which two ciphertexts can be compared to reveal the ordering of their underlying plaintexts. We show how to use order-revealing encryption to separate computationally efficient PAC learning
A Beimel   +27 more
core   +2 more sources

Diphthamide synthesis is linked to the eEF2‐client chaperone machinery

open access: yesFEBS Letters, EarlyView.
The diphthamide modification of eukaryotic translation elongation factor 2 (eEF2) is important for accurate protein synthesis. We addressed the potential coordination of de novo eEF2 synthesis with simultaneous or subsequent diphthamide modification. Our work reveals that the co‐chaperones Hgh1 and Cpr7, which are known to support folding of nascent ...
Lars Kaduhr   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy