Results 41 to 50 of about 10,264,102 (368)

A Simple, Accurate and Highly Secure Method to Encrypt-Decrypt Digital Images

open access: yesJOIV: International Journal on Informatics Visualization, 2019
The digital image may be important and has a secret character, which requires not understanding it when looking at the naked eye or not understanding the contents. So seeking a method of digital image encryption-decryption is a very important task.
Jamil Al-Azzeh, Ziad Alqadi, Qazem Jaber
doaj   +1 more source

A New Secret key Agreement Scheme in a Four-Terminal Network

open access: yes, 2011
A new scenario for generating a secret key and two private keys among three Terminals in the presence of an external eavesdropper is considered. Terminals 1, 2 and 3 intend to share a common secret key concealed from the external eavesdropper (Terminal 4)
Aref, Mohammad Reza   +2 more
core   +1 more source

On distilling secure key from reducible private states and (non)existence of entangled key-undistillable states

open access: yesNew Journal of Physics, 2018
Hereunder, we study the class of irreducible private states that are private states from which all the secret content is accessible via measuring their key part.
K Horodecki   +3 more
doaj   +1 more source

Private Key and Group Key Generation Using Correlated Sources and Wiretap Broadcast Channel in Presence of One-Way Public Communication

open access: yesIEEE Access, 2019
Encryption with shared key is one of the methods to ensure secure communication. To meet the requirements of keys, this paper investigates the problem of generating private key (PK) and group key (GK) using correlated sources and discrete memoryless ...
Shixun Gong   +3 more
doaj   +1 more source

Arabic Text Encryption Using Artificial Neural Networks [PDF]

open access: yesEngineering and Technology Journal, 2016
This research aims to build a cipher system using back propagation Algorithm with artificial neural network to encrypt any Arabic text and to prevent any data attack during the transition process.Encryption information holdsfour stages: 1)A neural ...
Oday Kamil Hamid
doaj   +1 more source

Enhancing sepsis biomarker development: key considerations from public and private perspectives

open access: yesCritical Care
Implementation of biomarkers in sepsis and septic shock in emergency situations, remains highly challenging. This viewpoint arose from a public–private 3-day workshop aiming to facilitate the transition of sepsis biomarkers into clinical practice.
J.-F. Llitjos   +9 more
semanticscholar   +1 more source

A Secure Visual Cryptography Scheme Using Private Key with Invariant Share Sizes

open access: yes, 2017
Visual cryptography (VC) is one of the best techniques used to secure information. It uses the human vision to decrypt the encrypted images without any cryptographic computations.
Rola I. Al-Khalid   +4 more
semanticscholar   +1 more source

Relation of Adverse Childhood Experiences to Clinical and Patient‐Reported Outcomes for Adults With Sickle Cell Disease: A Registry Study

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Adverse childhood experiences (ACEs) are stressful or traumatic events prior to age 18 that are known to have a lasting impact on individuals’ health and well‐being. There is a gap in understanding the relationship between ACEs and Other Life Stressors and health status for adults with sickle cell disease (SCD).
Marsha Treadwell   +8 more
wiley   +1 more source

A new code‐based digital signature based on the McEliece cryptosystem

open access: yesIET Communications, 2023
Digital signature schemes are used for the authentication and verification of signatures. The Courtois–Finiasz–Sendrier (CFS) digital signature is a well‐known code‐based digital signature scheme based on the Niederreiter cryptosystem. However, it is not
Farshid Haidary Makoui   +2 more
doaj   +1 more source

Medicines and vaccines for the world's poorest: Is there any prospect for public-private cooperation? [PDF]

open access: yes, 2005
This paper reviews the current status of the global pharmaceutical industry and its research and development focus in the context of the health care needs of the developing world.
Pathania, Vikram, Scheffler, Richard M
core   +3 more sources

Home - About - Disclaimer - Privacy