Results 71 to 80 of about 441,462 (365)
Protection of Semantic Organized Data. Encryption of RDF Graph
The problems of protection of semantic organized data and encryption of RDF graph are investigated. Technologies used in the construction of a semantic network are presented.
Galina Bogdanova+2 more
doaj +1 more source
B cells sense external mechanical forces and convert them into biochemical signals through mechanotransduction. Understanding how malignant B cells respond to physical stimuli represents a groundbreaking area of research. This review examines the key mechano‐related molecules and pathways in B lymphocytes, highlights the most relevant techniques to ...
Marta Sampietro+2 more
wiley +1 more source
A Novel Latin Square Image Cipher
In this paper, we introduce a symmetric-key Latin square image cipher (LSIC) for grayscale and color images. Our contributions to the image encryption community include 1) we develop new Latin square image encryption primitives including Latin Square ...
Aaronson+45 more
core +1 more source
Ultralong room temperature phosphorescence is achieved from amorphous organic materials toward information encryption. Ultralong room temperature phosphorescence (URTP) emitted from pure amorphous organic molecules is very rare.
Yan Su+9 more
semanticscholar +1 more source
A political, performative and affective landscape is revealed in this chapter as a way of approaching the topic of performing the digital: from the macro of the upheaval caused by Edward Snowden’s revelations of mass data surveillance to the micro of a phenomenological account of a crisis following an artistic performance using mobile media ...
openaire +2 more sources
Glutaredoxin (Grx) 3 proteins contain a thioredoxin domain and one to three class II Grx domains. These proteins play a crucial role in iron homeostasis in eukaryotic cells. In human Grx3, at least one of the two Grx domains, together with the thioredoxin domain, is essential for its function in iron metabolism.
Laura Magdalena Jordt+4 more
wiley +1 more source
A Taxonomy of Attacks on Privacy-Preserving Record Linkage
Record linkage is the process of identifying records that corresponds to the same real-world entities across different databases. Due to the absence of unique entity identifiers, record linkage is often based on quasi-identifying values of entities ...
Anushka Vidanage+3 more
doaj
Enkripsi dan Dekripsi File dengan Algoritma Blowfish pada Perangkat Mobile Berbasis Android
Cryptography is one of the ways used to secure data in the form of a file with encrypt files so that others are not entitled to know the file is private and confidential.
Siswo Wardoyo+2 more
doaj +1 more source
Mobile users are increasing exponentially to adopt ubiquitous services offered by various sectors. This has attracted attention for a secure communication framework to access e-health data on mobile devices.
Mohammad Ayoub Khan+3 more
doaj +1 more source
AES-CBC Software Execution Optimization
With the proliferation of high-speed wireless networking, the necessity for efficient, robust and secure encryption modes is ever increasing. But, cryptography is primarily a computationally intensive process.
Doma, Jayramsingh+2 more
core +1 more source