Results 81 to 90 of about 230,478 (367)

Homomorphic Encryption of Supervisory Control Systems Using Automata

open access: yesIEEE Access, 2020
Cyber-physical systems have been highly integrated into many contemporary infrastructures. As this integration deepens, the importance of protecting these systems from unauthorized access and data corruption increases.
Sian Zhou   +5 more
doaj   +1 more source

Ultralong room temperature phosphorescence from amorphous organic materials toward confidential information encryption and decryption

open access: yesScience Advances, 2018
Ultralong room temperature phosphorescence is achieved from amorphous organic materials toward information encryption. Ultralong room temperature phosphorescence (URTP) emitted from pure amorphous organic molecules is very rare.
Yan Su   +9 more
semanticscholar   +1 more source

The multiple roles of the NlpC_P60 peptidase family in mycobacteria – an underexplored target for antimicrobial drug discovery

open access: yesFEBS Letters, EarlyView.
The NlpC_P60 superfamily of peptidases is recognised by its key role in bacterial cell wall homeostasis. Recently, studies have also described the involvement of NlpC_P60‐like enzymes in bacterial competitive mechanisms and pathogenesis across several lineages.
Catharina dos Santos Silva   +1 more
wiley   +1 more source

Security Challenges in Smart-Grid Metering and Control Systems [PDF]

open access: yesTechnology Innovation Management Review, 2013
The smart grid is a next-generation power system that is increasingly attracting the attention of government, industry, and academia. It is an upgraded electricity network that depends on two-way digital communications between supplier and consumer that ...
Xinxin Fan, Guang Gong
doaj  

Uncloneable encryption

open access: yesQuantum Information and Computation, 2003
Quantum states cannot be cloned. I show how to extend this property to classical messages encoded using quantum states, a task I call ``uncloneable encryption.'' An uncloneable encryption scheme has the property that an eavesdropper Eve not only cannot read the encrypted message, but she cannot copy it down for later decoding.
openaire   +2 more sources

Making tau amyloid models in vitro: a crucial and underestimated challenge

open access: yesFEBS Letters, EarlyView.
This review highlights the challenges of producing in vitro amyloid assemblies of the tau protein. We review how accurately the existing protocols mimic tau deposits found in the brain of patients affected with tauopathies. We discuss the important properties that should be considered when forming amyloids and the benchmarks that should be used to ...
Julien Broc, Clara Piersson, Yann Fichou
wiley   +1 more source

Low-Complexity Versatile Finite Field Multiplier in Normal Basis

open access: yesEURASIP Journal on Advances in Signal Processing, 2002
A low-complexity VLSI array of versatile multiplier in normal basis over is presented. The finite field parameters can be changed according to the user′s requirement and make the multiplier reusable in different applications.
Zhang Chang Nian, Li Hua
doaj   +1 more source

Designing Secure Heterogeneous Multicore Systems from Untrusted Components

open access: yesCryptography, 2018
In current systems-on-chip (SoCs) designs, processing elements, i.e., intellectual property (IP) cores, may come from different providers, and executable code may have varying levels of trust, all executing on the same compute platform and sharing ...
Michel A. Kinsy   +3 more
doaj   +1 more source

Performing encryption

open access: yes, 2016
A political, performative and affective landscape is revealed in this chapter as a way of approaching the topic of performing the digital: from the macro of the upheaval caused by Edward Snowden’s revelations of mass data surveillance to the micro of a phenomenological account of a crisis following an artistic performance using mobile media ...
openaire   +1 more source

On Compressing Encrypted Data without the Encryption Key [PDF]

open access: yes, 2004
When it is desired to transmit redundant data over an insecure and bandwidth-constrained channel, it is customary to first compress the redundant data and then encrypt it for security reasons. In this paper, we investigate the novelty of reversing the order of these steps, i.e. first encrypting and then compressing.
Johnson, Mark   +2 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy