Results 41 to 50 of about 379,633 (259)
Color Image Encryption Using Hybrid Method of Fractal-Based Key and Private XOR Key [PDF]
The main idea of image encryption is to ensure secure transmitting it in the open network by transforming the image to not understandable form so that unauthorized person cannot decrypt and see it.
Faten H. MohammedSediq +2 more
doaj +1 more source
Clustering Algorithm Reveals Dopamine‐Motor Mismatch in Cognitively Preserved Parkinson's Disease
ABSTRACT Objective To explore the relationship between dopaminergic denervation and motor impairment in two de novo Parkinson's disease (PD) cohorts. Methods n = 249 PD patients from Parkinson's Progression Markers Initiative (PPMI) and n = 84 from an external clinical cohort.
Rachele Malito +14 more
wiley +1 more source
Private data isolation for OpenSSH based on virtual machines
OpenSSH stores keys in the file system.The keys are easy to be exposed while the host has been invaded by illegal users.Methods are needed to protect these important data.For such purpose,virtual machine protection was pro-posed to provide a separate ...
CHEN Kang, YU Hong-liang, ZHENG Wei-min
doaj +2 more sources
Practical Inner Product Encryption with Constant Private Key
Inner product encryption, first introduced by Katz et al., is a type of predicate encryption in which a ciphertext and a private key correspond to an attribute vector and a predicate vector, respectively.
Yi-Fan Tseng, Zi-Yuan Liu, Raylin Tso
doaj +1 more source
Fault attacks on authenticated encryption modes for GIFT
There are several authenticated encryption modes for block cipher GIFT in the NIST lightweight cryptography standardisation process. In this study, the authors research on the fault attacks on this kind of authenticated encryption modes and mainly ...
Shuai Liu, Jie Guan, Bin Hu
doaj +1 more source
Five‐Year Disease Progression in Synuclein Seeding Positive Sporadic Parkinson's Disease
ABSTRACT Objective To provide a comprehensive description of disease progression in synuclein seeding assay (SAA) positive sporadic Parkinson Disease participants, using Neuronal Synuclein Disease integrated biological and functional impairment staging framework.
Paulina Gonzalez‐Latapi +19 more
wiley +1 more source
Post-quantum cryptography-driven security framework for cloud computing
Data security in the cloud has been a major issue since the inception and adoption of cloud computing. Various frameworks have been proposed, and yet data breach prevails.
Ukwuoma Henry Chima +3 more
doaj +1 more source
CSF Monoamine Metabolites and Cognitive Trajectory in Early Parkinson's Disease
ABSTRACT Background Imaging and postmortem studies indicate that abnormalities in monoaminergic neurotransmission contribute to cognitive impairment in Parkinson's disease (PD). However, it remains uncertain if cerebrospinal fluid (CSF) monoamine metabolites can serve as biomarkers of cognitive decline in early PD.
Jing‐Yu Shao +7 more
wiley +1 more source
Objective This study aims to develop hip morphology‐based radiographic hip osteoarthritis (RHOA) risk prediction models and investigates the added predictive value of hip morphology measurements and the generalizability to different populations. Methods We combined data from nine prospective cohort studies participating in the Worldwide Collaboration ...
Myrthe A. van den Berg +26 more
wiley +1 more source
Secure and efficient two-party ECDSA signature scheme
To solve the easy disclosure of signature private key and excessive concentration of signature rights, a secure and efficient two-party ECDSA signature scheme was proposed for the blockchain based network trading systems.By pre-computing one-time pad ...
Jing WANG, Libing WU, Min LUO, Debiao HE
doaj +2 more sources

