Results 71 to 80 of about 441,462 (365)

Protection of Semantic Organized Data. Encryption of RDF Graph

open access: yesDigital Presentation and Preservation of Cultural and Scientific Heritage, 2014
The problems of protection of semantic organized data and encryption of RDF graph are investigated. Technologies used in the construction of a semantic network are presented.
Galina Bogdanova   +2 more
doaj   +1 more source

B cell mechanobiology in health and disease: emerging techniques and insights into therapeutic responses

open access: yesFEBS Letters, EarlyView.
B cells sense external mechanical forces and convert them into biochemical signals through mechanotransduction. Understanding how malignant B cells respond to physical stimuli represents a groundbreaking area of research. This review examines the key mechano‐related molecules and pathways in B lymphocytes, highlights the most relevant techniques to ...
Marta Sampietro   +2 more
wiley   +1 more source

A Novel Latin Square Image Cipher

open access: yes, 2012
In this paper, we introduce a symmetric-key Latin square image cipher (LSIC) for grayscale and color images. Our contributions to the image encryption community include 1) we develop new Latin square image encryption primitives including Latin Square ...
Aaronson   +45 more
core   +1 more source

Ultralong room temperature phosphorescence from amorphous organic materials toward confidential information encryption and decryption

open access: yesScience Advances, 2018
Ultralong room temperature phosphorescence is achieved from amorphous organic materials toward information encryption. Ultralong room temperature phosphorescence (URTP) emitted from pure amorphous organic molecules is very rare.
Yan Su   +9 more
semanticscholar   +1 more source

Performing encryption

open access: yes, 2016
A political, performative and affective landscape is revealed in this chapter as a way of approaching the topic of performing the digital: from the macro of the upheaval caused by Edward Snowden’s revelations of mass data surveillance to the micro of a phenomenological account of a crisis following an artistic performance using mobile media ...
openaire   +2 more sources

The thioredoxin‐like and one glutaredoxin domain are required to rescue the iron‐starvation phenotype of HeLa GLRX3 knock out cells

open access: yesFEBS Letters, EarlyView.
Glutaredoxin (Grx) 3 proteins contain a thioredoxin domain and one to three class II Grx domains. These proteins play a crucial role in iron homeostasis in eukaryotic cells. In human Grx3, at least one of the two Grx domains, together with the thioredoxin domain, is essential for its function in iron metabolism.
Laura Magdalena Jordt   +4 more
wiley   +1 more source

A Taxonomy of Attacks on Privacy-Preserving Record Linkage

open access: yesThe Journal of Privacy and Confidentiality, 2022
Record linkage is the process of identifying records that corresponds to the same real-world entities across different databases. Due to the absence of unique entity identifiers, record linkage is often based on quasi-identifying values of entities ...
Anushka Vidanage   +3 more
doaj  

Enkripsi dan Dekripsi File dengan Algoritma Blowfish pada Perangkat Mobile Berbasis Android

open access: yesJurnal Nasional Teknik Elektro, 2016
Cryptography is one of the ways used to secure data in the form of a file with encrypt files so that others are not entitled to know the file is private and confidential.
Siswo Wardoyo   +2 more
doaj   +1 more source

A Secure Framework for Authentication and Encryption Using Improved ECC for IoT-Based Medical Sensor Data

open access: yesIEEE Access, 2020
Mobile users are increasing exponentially to adopt ubiquitous services offered by various sectors. This has attracted attention for a secure communication framework to access e-health data on mobile devices.
Mohammad Ayoub Khan   +3 more
doaj   +1 more source

AES-CBC Software Execution Optimization

open access: yes, 2012
With the proliferation of high-speed wireless networking, the necessity for efficient, robust and secure encryption modes is ever increasing. But, cryptography is primarily a computationally intensive process.
Doma, Jayramsingh   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy