Results 81 to 90 of about 441,462 (365)

On Compressing Encrypted Data without the Encryption Key [PDF]

open access: yes, 2004
When it is desired to transmit redundant data over an insecure and bandwidth-constrained channel, it is customary to first compress the redundant data and then encrypt it for security reasons. In this paper, we investigate the novelty of reversing the order of these steps, i.e. first encrypting and then compressing.
Johnson, Mark   +2 more
openaire   +3 more sources

In vivo evidence for glycyl radical insertion into a catalytically inactive variant of pyruvate formate‐lyase

open access: yesFEBS Letters, EarlyView.
Dimeric pyruvate formate‐lyase cleaves pyruvate using a radical‐based mechanism. G734 serves as a radical storage location, and the radical is transferred to the catalytic C419 residue. Mutation of the C418‐C419 pair causes loss of enzyme activity, but does not impede radical introduction onto G734. Therefore, cis‐ but not trans‐radical transfer occurs
Michelle Kammel   +2 more
wiley   +1 more source

A Low Power Cryptography Solution Based on Chaos Theory in Wireless Sensor Nodes

open access: yesIEEE Access, 2019
Unobtrusive personal data collection by wearable sensors and ambient monitoring has increased concerns about user privacy. Applying cryptography solutions to resource constraint wireless sensors as one of the privacy-preserving solutions demand ...
Masoumeh Sharafi   +3 more
doaj   +1 more source

A Novel Cancelable FaceHashing Technique Based on Non-Invertible Transformation With Encryption and Decryption Template

open access: yesIEEE Access, 2020
A novel cancelable FaceHashing technique based on non-invertible transformation with encryption and decryption template has been proposed in this paper.
Alamgir Sardar   +3 more
doaj   +1 more source

Conditionals in Homomorphic Encryption and Machine Learning Applications [PDF]

open access: yes, 2018
Homomorphic encryption aims at allowing computations on encrypted data without decryption other than that of the final result. This could provide an elegant solution to the issue of privacy preservation in data-based applications, such as those using ...
Chialva, Diego, Dooms, Ann
core   +1 more source

Evolutionary interplay between viruses and R‐loops

open access: yesFEBS Letters, EarlyView.
Viruses interact with specialized nucleic acid structures called R‐loops to influence host transcription, epigenetic states, latency, and immune evasion. This Perspective examines the roles of R‐loops in viral replication, integration, and silencing, and how viruses co‐opt or avoid these structures.
Zsolt Karányi   +4 more
wiley   +1 more source

An Innovative Near-Field Communication Security Based on the Chaos Generated by Memristive Circuits Adopted as Symmetrical Key

open access: yesIEEE Access, 2020
The new technology solutions are playing an important role in the hardware security. One of the latest techniques is the use of the Memristor as an encryption element.
Colin Sokol Kuka   +3 more
doaj   +1 more source

Uncloneable encryption

open access: yesQuantum Information and Computation, 2003
Quantum states cannot be cloned. I show how to extend this property to classical messages encoded using quantum states, a task I call ``uncloneable encryption.'' An uncloneable encryption scheme has the property that an eavesdropper Eve not only cannot read the encrypted message, but she cannot copy it down for later decoding.
openaire   +2 more sources

Classification of Encrypted Text and Encrypted Speech

open access: yesDefence Science Journal, 2010
The information to be exchanged between two parties can be text data or speech data. This data is encrypted for its security and communicated (to the other end). When an adversary intercepts these encrypted data then in order to recover the actual information, his first step is to identify whether intercepted data is encrypted text or encrypted speech ...
Neelam Verma, Rajesh Asthana
openaire   +2 more sources

Disruption of SETD3‐mediated histidine‐73 methylation by the BWCFF‐associated β‐actin G74S mutation

open access: yesFEBS Letters, EarlyView.
The β‐actin G74S mutation causes altered interaction of actin with SETD3, reducing histidine‐73 methylation efficiency and forming two distinct actin variants. The variable ratio of these variants across cell types and developmental stages contributes to tissue‐specific phenotypical changes. This imbalance may impair actin dynamics and mechanosensitive
Anja Marquardt   +8 more
wiley   +1 more source

Home - About - Disclaimer - Privacy