Results 41 to 50 of about 379,633 (259)

Color Image Encryption Using Hybrid Method of Fractal-Based Key and Private XOR Key [PDF]

open access: yesKirkuk Journal of Science, 2018
The main idea of image encryption is to ensure secure transmitting it in the open network by transforming the image to not understandable form so that unauthorized person cannot decrypt and see it.
Faten H. MohammedSediq   +2 more
doaj   +1 more source

Clustering Algorithm Reveals Dopamine‐Motor Mismatch in Cognitively Preserved Parkinson's Disease

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective To explore the relationship between dopaminergic denervation and motor impairment in two de novo Parkinson's disease (PD) cohorts. Methods n = 249 PD patients from Parkinson's Progression Markers Initiative (PPMI) and n = 84 from an external clinical cohort.
Rachele Malito   +14 more
wiley   +1 more source

Private data isolation for OpenSSH based on virtual machines

open access: yesTongxin xuebao, 2009
OpenSSH stores keys in the file system.The keys are easy to be exposed while the host has been invaded by illegal users.Methods are needed to protect these important data.For such purpose,virtual machine protection was pro-posed to provide a separate ...
CHEN Kang, YU Hong-liang, ZHENG Wei-min
doaj   +2 more sources

Practical Inner Product Encryption with Constant Private Key

open access: yesApplied Sciences, 2020
Inner product encryption, first introduced by Katz et al., is a type of predicate encryption in which a ciphertext and a private key correspond to an attribute vector and a predicate vector, respectively.
Yi-Fan Tseng, Zi-Yuan Liu, Raylin Tso
doaj   +1 more source

Fault attacks on authenticated encryption modes for GIFT

open access: yesIET Information Security, 2022
There are several authenticated encryption modes for block cipher GIFT in the NIST lightweight cryptography standardisation process. In this study, the authors research on the fault attacks on this kind of authenticated encryption modes and mainly ...
Shuai Liu, Jie Guan, Bin Hu
doaj   +1 more source

Five‐Year Disease Progression in Synuclein Seeding Positive Sporadic Parkinson's Disease

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective To provide a comprehensive description of disease progression in synuclein seeding assay (SAA) positive sporadic Parkinson Disease participants, using Neuronal Synuclein Disease integrated biological and functional impairment staging framework.
Paulina Gonzalez‐Latapi   +19 more
wiley   +1 more source

Post-quantum cryptography-driven security framework for cloud computing

open access: yesOpen Computer Science, 2022
Data security in the cloud has been a major issue since the inception and adoption of cloud computing. Various frameworks have been proposed, and yet data breach prevails.
Ukwuoma Henry Chima   +3 more
doaj   +1 more source

CSF Monoamine Metabolites and Cognitive Trajectory in Early Parkinson's Disease

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background Imaging and postmortem studies indicate that abnormalities in monoaminergic neurotransmission contribute to cognitive impairment in Parkinson's disease (PD). However, it remains uncertain if cerebrospinal fluid (CSF) monoamine metabolites can serve as biomarkers of cognitive decline in early PD.
Jing‐Yu Shao   +7 more
wiley   +1 more source

Hip Morphology–Based Osteoarthritis Risk Prediction Models: Development and External Validation Using Individual Participant Data From the World COACH Consortium

open access: yesArthritis Care &Research, EarlyView.
Objective This study aims to develop hip morphology‐based radiographic hip osteoarthritis (RHOA) risk prediction models and investigates the added predictive value of hip morphology measurements and the generalizability to different populations. Methods We combined data from nine prospective cohort studies participating in the Worldwide Collaboration ...
Myrthe A. van den Berg   +26 more
wiley   +1 more source

Secure and efficient two-party ECDSA signature scheme

open access: yesTongxin xuebao, 2021
To solve the easy disclosure of signature private key and excessive concentration of signature rights, a secure and efficient two-party ECDSA signature scheme was proposed for the blockchain based network trading systems.By pre-computing one-time pad ...
Jing WANG, Libing WU, Min LUO, Debiao HE
doaj   +2 more sources

Home - About - Disclaimer - Privacy