Results 71 to 80 of about 299,742 (318)

Generalization of RSA cryptosystem based on 2n primes

open access: yesAIMS Mathematics, 2023
This article introduced a new generalized RSA crypto-system based on $ 2n $ prime numbers called generalized RSA (GRSA). This is a modern technique to provide supreme security for the computer world by factoring the variable$ N $, where its analysis ...
Tariq Shah   +4 more
doaj   +1 more source

Single‐cell insights into the role of T cells in B‐cell malignancies

open access: yesFEBS Letters, EarlyView.
Single‐cell technologies have transformed our understanding of T cell–tumor cell interactions in B‐cell malignancies, revealing new T‐cell subsets, functional states, and immune evasion mechanisms. This Review synthesizes these findings, highlighting the roles of T cells in pathogenesis, progression, and therapy response, and underscoring their ...
Laura Llaó‐Cid
wiley   +1 more source

Machine Learning in Chaos-Based Encryption: Theory, Implementations, and Applications

open access: yesIEEE Access, 2023
Chaos-based encryption is a promising approach to secure communication due to its complexity and unpredictability. However, various challenges lie in the design and implementation of efficient, low-power, attack-resistant chaos-based encryption schemes ...
Jinha Hwang   +7 more
doaj   +1 more source

Performing encryption

open access: yes, 2016
A political, performative and affective landscape is revealed in this chapter as a way of approaching the topic of performing the digital: from the macro of the upheaval caused by Edward Snowden’s revelations of mass data surveillance to the micro of a phenomenological account of a crisis following an artistic performance using mobile media ...
openaire   +2 more sources

ReACT_OCRS: An AI-Driven Anonymous Online Reporting System Using Synergized Reasoning and Acting in Language Models

open access: yesIEEE Access
Victims and witnesses of cybercrime often hesitate to report incidents due to concerns over privacy, complexity, and fear of retaliation. Traditional reporting mechanisms require manual data entry, creating accessibility barriers and delaying response ...
Amir Aboubakr Shaker Mahmoud   +2 more
doaj   +1 more source

Security of the data transmission in the industrial control system [PDF]

open access: yesBiuletyn Wojskowej Akademii Technicznej, 2015
The theme of this paper is to present the data transmission security system between the stations of the industrial control system. The possible options for secure communications between process stations, as well as between process and operator station ...
Marcin Bednarek, Tadeusz Dąbrowski
doaj   +1 more source

Intron‐oriented HTLV‐1 integration in an adult T‐cell leukemia/lymphoma cell line sustains expression of intact ift81 mRNA

open access: yesFEBS Letters, EarlyView.
In the adult T‐cell leukemia/lymphoma (ATL) cell line ED, the human T‐cell leukemia virus type 1 (HTLV‐1) provirus was integrated into the intron of the ift81 gene in the antisense orientation. Despite this integration, both the intact ift81 and the viral oncogene hbz were simultaneously expressed, likely due to the functional insufficiency of viral ...
Mayuko Yagi   +5 more
wiley   +1 more source

Personal Data Security: Divergent Standards in the European Union and the United States [PDF]

open access: yes, 1995
This Note argues that the U.S. Government should discontinue all attempts to establish EES as the de facto encryption standard in the United States because the economic disadvantages associated with widespread implementation of EES outweigh the ...
Fleischmann, Amy
core   +1 more source

Cyclic nucleotide signaling as a drug target in retinitis pigmentosa

open access: yesFEBS Letters, EarlyView.
Disruptions in cGMP and cAMP signaling can contribute to retinal dysfunction and photoreceptor loss in retinitis pigmentosa. This perspective examines the mechanisms and evaluates emerging evidence on targeting these pathways as a potential therapeutic strategy to slow or prevent retinal degeneration.
Katri Vainionpää   +2 more
wiley   +1 more source

On Compressing Encrypted Data without the Encryption Key [PDF]

open access: yes, 2004
When it is desired to transmit redundant data over an insecure and bandwidth-constrained channel, it is customary to first compress the redundant data and then encrypt it for security reasons. In this paper, we investigate the novelty of reversing the order of these steps, i.e. first encrypting and then compressing.
Johnson, Mark   +2 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy