Results 81 to 90 of about 441,462 (365)
On Compressing Encrypted Data without the Encryption Key [PDF]
When it is desired to transmit redundant data over an insecure and bandwidth-constrained channel, it is customary to first compress the redundant data and then encrypt it for security reasons. In this paper, we investigate the novelty of reversing the order of these steps, i.e. first encrypting and then compressing.
Johnson, Mark+2 more
openaire +3 more sources
Dimeric pyruvate formate‐lyase cleaves pyruvate using a radical‐based mechanism. G734 serves as a radical storage location, and the radical is transferred to the catalytic C419 residue. Mutation of the C418‐C419 pair causes loss of enzyme activity, but does not impede radical introduction onto G734. Therefore, cis‐ but not trans‐radical transfer occurs
Michelle Kammel+2 more
wiley +1 more source
A Low Power Cryptography Solution Based on Chaos Theory in Wireless Sensor Nodes
Unobtrusive personal data collection by wearable sensors and ambient monitoring has increased concerns about user privacy. Applying cryptography solutions to resource constraint wireless sensors as one of the privacy-preserving solutions demand ...
Masoumeh Sharafi+3 more
doaj +1 more source
A novel cancelable FaceHashing technique based on non-invertible transformation with encryption and decryption template has been proposed in this paper.
Alamgir Sardar+3 more
doaj +1 more source
Conditionals in Homomorphic Encryption and Machine Learning Applications [PDF]
Homomorphic encryption aims at allowing computations on encrypted data without decryption other than that of the final result. This could provide an elegant solution to the issue of privacy preservation in data-based applications, such as those using ...
Chialva, Diego, Dooms, Ann
core +1 more source
Evolutionary interplay between viruses and R‐loops
Viruses interact with specialized nucleic acid structures called R‐loops to influence host transcription, epigenetic states, latency, and immune evasion. This Perspective examines the roles of R‐loops in viral replication, integration, and silencing, and how viruses co‐opt or avoid these structures.
Zsolt Karányi+4 more
wiley +1 more source
The new technology solutions are playing an important role in the hardware security. One of the latest techniques is the use of the Memristor as an encryption element.
Colin Sokol Kuka+3 more
doaj +1 more source
Quantum states cannot be cloned. I show how to extend this property to classical messages encoded using quantum states, a task I call ``uncloneable encryption.'' An uncloneable encryption scheme has the property that an eavesdropper Eve not only cannot read the encrypted message, but she cannot copy it down for later decoding.
openaire +2 more sources
Classification of Encrypted Text and Encrypted Speech
The information to be exchanged between two parties can be text data or speech data. This data is encrypted for its security and communicated (to the other end). When an adversary intercepts these encrypted data then in order to recover the actual information, his first step is to identify whether intercepted data is encrypted text or encrypted speech ...
Neelam Verma, Rajesh Asthana
openaire +2 more sources
Disruption of SETD3‐mediated histidine‐73 methylation by the BWCFF‐associated β‐actin G74S mutation
The β‐actin G74S mutation causes altered interaction of actin with SETD3, reducing histidine‐73 methylation efficiency and forming two distinct actin variants. The variable ratio of these variants across cell types and developmental stages contributes to tissue‐specific phenotypical changes. This imbalance may impair actin dynamics and mechanosensitive
Anja Marquardt+8 more
wiley +1 more source