Results 71 to 80 of about 478,748 (354)

Using Blockchain to Ensure Trust between Donor Agencies and NGOs in Under-Developed Countries

open access: yesComputers, 2021
Non-governmental organizations (NGOs) in under-developed countries are receiving funds from donor agencies for various purposes, including relief from natural disasters and other emergencies, promoting education, women empowerment, economic development ...
Ehsan Rehman   +5 more
doaj   +1 more source

An intracellular transporter mitigates the CO2‐induced decline in iron content in Arabidopsis shoots

open access: yesFEBS Letters, EarlyView.
This study identifies a gene encoding a transmembrane protein, MIC, which contributes to the reduction of shoot Fe content observed in plants under elevated CO2. MIC is a putative Fe transporter localized to the Golgi and endosomal compartments. Its post‐translational regulation in roots may represent a potential target for improving plant nutrition ...
Timothy Mozzanino   +7 more
wiley   +1 more source

Performance evaluations of AI-based obfuscated and encrypted malicious script detection with feature optimization

open access: yesETRI Journal
In the digital security environment, the obfuscation and encryption of mali-cious scripts are primary attack methods used to evade detection. Thesescripts—easily spread through websites, emails, and file downloads—can beautomatically executed on users ...
Kookjin Kim   +3 more
doaj   +1 more source

Encryption of a Message by HillAli Cipher and Security of Routing Path by DSR in Wireless Sensor Network

open access: yesJournal of Communications Software and Systems
A Wireless Sensor Network (WSN) is a collection of sensors that communicate or track a specific object. It is used in many fields of war, architecture, or espionage, but the wireless sensor network faces challenges in securing the path or the message ...
Haneen Mohammed Hussein   +2 more
doaj   +1 more source

Physical Layer Authenticated Image Encryption for IoT Network Based on Biometric Chaotic Signature for MPFrFT OFDM System

open access: yesSensors, 2023
In this paper, a new physical layer authenticated encryption (PLAE) scheme based on the multi-parameter fractional Fourier transform–Orthogonal frequency division multiplexing (MP-FrFT-OFDM) is suggested for secure image transmission over the IoT network.
Esam A. A. Hagras   +3 more
doaj   +1 more source

A chaotic based image encryption scheme using elliptic curve cryptography and genetic algorithm

open access: yesArtificial Intelligence Review
In the era of digital communication and data security, image encryption plays a crucial role in safeguarding sensitive information. Protecting sensitive visual data from unauthorized access drives the pursuit of advanced image encryption methods.
Sanjay Kumar, Deepmala Sharma
semanticscholar   +1 more source

A Cre‐dependent lentiviral vector for neuron subtype‐specific expression of large proteins

open access: yesFEBS Letters, EarlyView.
We designed a versatile and modular lentivector comprising a Cre‐dependent switch and self‐cleaving 2A peptide and tested it for co‐expression of GFP and a 2.8 kb gene of interest (GOI) in mouse cortical parvalbumin (PV+) interneurons and midbrain dopamine (TH+) neurons.
Weixuan Xue   +6 more
wiley   +1 more source

An Enhanced Cloud Network Integrity and Fair Compensation Scheme Through Data Structures and Blockchain Enforcement

open access: yesEng
The expansion of cloud-based storage has intensified concerns about integrity, security, and fair compensation for third-party auditors. Existing authentication methods often compromise privacy with high computational costs, punctuating the need for an ...
Renato Racelis Maaliw
doaj   +1 more source

By dawn or dusk—how circadian timing rewrites bacterial infection outcomes

open access: yesFEBS Letters, EarlyView.
The circadian clock shapes immune function, yet its influence on infection outcomes is only beginning to be understood. This review highlights how circadian timing alters host responses to the bacterial pathogens Salmonella enterica, Listeria monocytogenes, and Streptococcus pneumoniae revealing that the effectiveness of immune defense depends not only
Devons Mo   +2 more
wiley   +1 more source

Strike: Stream Cipher Based on Stochastic Lightning Strike Behaviour

open access: yesApplied Sciences, 2023
There is an increasing need for secure and fast encryption algorithms to support applications and communication protocols, and business models. In this paper, we present an alternative stream cipher (Strike) inspired by the stochastic behaviour of ...
Khaled Suwais, Sally Almanasra
doaj   +1 more source

Home - About - Disclaimer - Privacy