Results 81 to 90 of about 459,845 (362)
A political, performative and affective landscape is revealed in this chapter as a way of approaching the topic of performing the digital: from the macro of the upheaval caused by Edward Snowden’s revelations of mass data surveillance to the micro of a phenomenological account of a crisis following an artistic performance using mobile media ...
openaire +2 more sources
Exploring lipid diversity and minimalism to define membrane requirements for synthetic cells
Designing the lipid membrane of synthetic cells is a complex task, in which its various roles (among them solute transport, membrane protein support, and self‐replication) should all be integrated. In this review, we report the latest top‐down and bottom‐up advances and discuss compatibility and complexity issues of current engineering approaches ...
Sergiy Gan +2 more
wiley +1 more source
On Compressing Encrypted Data without the Encryption Key [PDF]
When it is desired to transmit redundant data over an insecure and bandwidth-constrained channel, it is customary to first compress the redundant data and then encrypt it for security reasons. In this paper, we investigate the novelty of reversing the order of these steps, i.e. first encrypting and then compressing.
Johnson, Mark +2 more
openaire +3 more sources
Personal Data Security: Divergent Standards in the European Union and the United States [PDF]
This Note argues that the U.S. Government should discontinue all attempts to establish EES as the de facto encryption standard in the United States because the economic disadvantages associated with widespread implementation of EES outweigh the ...
Fleischmann, Amy
core +1 more source
C‐mannosylation is a unique form of protein glycosylation. In this study, we demonstrated that ADAMTS1 is C‐mannosylated at Trp562 and Trp565 in human testicular germ cell tumor NEC8 cells. We found that C‐mannosylation of ADAMTS1 is essential for its secretion, processing, enzymatic activity, and ability to promote vasculogenic mimicry. These findings
Takato Kobayashi +5 more
wiley +1 more source
Reversible AMBTC-Based Data Hiding With Security Improvement by Chaotic Encryption
Social networking and cloud computing are being extensively used, and in this era, the frequency of sending information or images to each other is increasing. The prevention of private information leakage during communication over the Internet has become
Hsiang-Ying Wang +4 more
doaj +1 more source
Ultralong room temperature phosphorescence is achieved from amorphous organic materials toward information encryption. Ultralong room temperature phosphorescence (URTP) emitted from pure amorphous organic molecules is very rare.
Yan Su +9 more
semanticscholar +1 more source
Reprogrammable meta-hologram for optical encryption
Meta-holographic encryption is a potentially important technique for information security. Despite rapid progresses in multi-tasked meta-holograms, the number of information channels available in metasurfaces is limited, making meta-holographic ...
Geyang Qu +7 more
semanticscholar +1 more source
The Arabidopsis mutants hls1 hlh1 and amp1 lamp1 exhibit pleiotropic developmental phenotypes. Although the functions of the causative genes remain unclear, they act in the same genetic pathway and are thought to generate non‐cell‐autonomous signals.
Takashi Nobusawa, Makoto Kusaba
wiley +1 more source
Classification of Encrypted Text and Encrypted Speech
The information to be exchanged between two parties can be text data or speech data. This data is encrypted for its security and communicated (to the other end). When an adversary intercepts these encrypted data then in order to recover the actual information, his first step is to identify whether intercepted data is encrypted text or encrypted speech ...
Neelam Verma, Rajesh Asthana
openaire +2 more sources

