Results 41 to 50 of about 10,103,841 (323)

Enhancing sepsis biomarker development: key considerations from public and private perspectives

open access: yesCritical Care
Implementation of biomarkers in sepsis and septic shock in emergency situations, remains highly challenging. This viewpoint arose from a public–private 3-day workshop aiming to facilitate the transition of sepsis biomarkers into clinical practice.
J.-F. Llitjos   +9 more
semanticscholar   +1 more source

Private Key and Group Key Generation Using Correlated Sources and Wiretap Broadcast Channel in Presence of One-Way Public Communication

open access: yesIEEE Access, 2019
Encryption with shared key is one of the methods to ensure secure communication. To meet the requirements of keys, this paper investigates the problem of generating private key (PK) and group key (GK) using correlated sources and discrete memoryless ...
Shixun Gong   +3 more
doaj   +1 more source

Analysis of common attacks in LDPCC-based public-key cryptosystems [PDF]

open access: yes, 2003
We analyze the security and reliability of a recently proposed class of public-key cryptosystems against attacks by unauthorized parties who have acquired partial knowledge of one or more of the private key components and/or of the plaintext.
D. Saad   +17 more
core   +2 more sources

On distilling secure key from reducible private states and (non)existence of entangled key-undistillable states

open access: yesNew Journal of Physics, 2018
Hereunder, we study the class of irreducible private states that are private states from which all the secret content is accessible via measuring their key part.
K Horodecki   +3 more
doaj   +1 more source

A Simple, Accurate and Highly Secure Method to Encrypt-Decrypt Digital Images

open access: yesJOIV: International Journal on Informatics Visualization, 2019
The digital image may be important and has a secret character, which requires not understanding it when looking at the naked eye or not understanding the contents. So seeking a method of digital image encryption-decryption is a very important task.
Jamil Al-Azzeh, Ziad Alqadi, Qazem Jaber
doaj   +1 more source

A new code‐based digital signature based on the McEliece cryptosystem

open access: yesIET Communications, 2023
Digital signature schemes are used for the authentication and verification of signatures. The Courtois–Finiasz–Sendrier (CFS) digital signature is a well‐known code‐based digital signature scheme based on the Niederreiter cryptosystem. However, it is not
Farshid Haidary Makoui   +2 more
doaj   +1 more source

Architecture and key technologies of 5G power private network

open access: yesDianxin kexue, 2022
Some main aspects of 5G power private network including network architecture, key technologies and the analysis on the existing key issues aiming to large-scale commercial use were intorduced.Firstly, the service characteristics of power grid was combed ...
Rong WANG   +4 more
doaj   +2 more sources

Design and parallel implementation on Artix-7 FPGA of the SIMON32/64 Cryptosystem

open access: yesVisión Electrónica, 2022
In the rise of digital transformation, information security is positioned in a prominent place because it provides confidence to society in the use of information technologies. For this reason, there is growing research in this area.
José Gabriel Rincón-González   +2 more
doaj  

Efficient Quantum Private Comparison without Sharing a Key

open access: yesEntropy, 2023
Quantum private comparison (QPC) allows at least two users to compare the equality of their secret information, for which the security is based on the properties of quantum mechanics.
Jian Li, Fanting Che, Zhuo Wang, Anqi Fu
doaj   +1 more source

Why emerging leaders should focus on being good postdoctoral supervisors

open access: yesFEBS Letters, EarlyView.
Swamped with work and suddenly a new student is waiting at your doorstep for supervision? Great—this is your chance! In this article, we share tips on how postdocs can strengthen their leadership skills while supervising students. This image has been created using DALL·E. Many postdocs work as leaders later in their career.
Hannah Rostalski   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy