Results 41 to 50 of about 10,264,102 (368)
A Simple, Accurate and Highly Secure Method to Encrypt-Decrypt Digital Images
The digital image may be important and has a secret character, which requires not understanding it when looking at the naked eye or not understanding the contents. So seeking a method of digital image encryption-decryption is a very important task.
Jamil Al-Azzeh, Ziad Alqadi, Qazem Jaber
doaj +1 more source
A New Secret key Agreement Scheme in a Four-Terminal Network
A new scenario for generating a secret key and two private keys among three Terminals in the presence of an external eavesdropper is considered. Terminals 1, 2 and 3 intend to share a common secret key concealed from the external eavesdropper (Terminal 4)
Aref, Mohammad Reza +2 more
core +1 more source
Hereunder, we study the class of irreducible private states that are private states from which all the secret content is accessible via measuring their key part.
K Horodecki +3 more
doaj +1 more source
Encryption with shared key is one of the methods to ensure secure communication. To meet the requirements of keys, this paper investigates the problem of generating private key (PK) and group key (GK) using correlated sources and discrete memoryless ...
Shixun Gong +3 more
doaj +1 more source
Arabic Text Encryption Using Artificial Neural Networks [PDF]
This research aims to build a cipher system using back propagation Algorithm with artificial neural network to encrypt any Arabic text and to prevent any data attack during the transition process.Encryption information holdsfour stages: 1)A neural ...
Oday Kamil Hamid
doaj +1 more source
Enhancing sepsis biomarker development: key considerations from public and private perspectives
Implementation of biomarkers in sepsis and septic shock in emergency situations, remains highly challenging. This viewpoint arose from a public–private 3-day workshop aiming to facilitate the transition of sepsis biomarkers into clinical practice.
J.-F. Llitjos +9 more
semanticscholar +1 more source
A Secure Visual Cryptography Scheme Using Private Key with Invariant Share Sizes
Visual cryptography (VC) is one of the best techniques used to secure information. It uses the human vision to decrypt the encrypted images without any cryptographic computations.
Rola I. Al-Khalid +4 more
semanticscholar +1 more source
ABSTRACT Background Adverse childhood experiences (ACEs) are stressful or traumatic events prior to age 18 that are known to have a lasting impact on individuals’ health and well‐being. There is a gap in understanding the relationship between ACEs and Other Life Stressors and health status for adults with sickle cell disease (SCD).
Marsha Treadwell +8 more
wiley +1 more source
A new code‐based digital signature based on the McEliece cryptosystem
Digital signature schemes are used for the authentication and verification of signatures. The Courtois–Finiasz–Sendrier (CFS) digital signature is a well‐known code‐based digital signature scheme based on the Niederreiter cryptosystem. However, it is not
Farshid Haidary Makoui +2 more
doaj +1 more source
Medicines and vaccines for the world's poorest: Is there any prospect for public-private cooperation? [PDF]
This paper reviews the current status of the global pharmaceutical industry and its research and development focus in the context of the health care needs of the developing world.
Pathania, Vikram, Scheffler, Richard M
core +3 more sources

