Results 41 to 50 of about 10,103,841 (323)
Enhancing sepsis biomarker development: key considerations from public and private perspectives
Implementation of biomarkers in sepsis and septic shock in emergency situations, remains highly challenging. This viewpoint arose from a public–private 3-day workshop aiming to facilitate the transition of sepsis biomarkers into clinical practice.
J.-F. Llitjos +9 more
semanticscholar +1 more source
Encryption with shared key is one of the methods to ensure secure communication. To meet the requirements of keys, this paper investigates the problem of generating private key (PK) and group key (GK) using correlated sources and discrete memoryless ...
Shixun Gong +3 more
doaj +1 more source
Analysis of common attacks in LDPCC-based public-key cryptosystems [PDF]
We analyze the security and reliability of a recently proposed class of public-key cryptosystems against attacks by unauthorized parties who have acquired partial knowledge of one or more of the private key components and/or of the plaintext.
D. Saad +17 more
core +2 more sources
Hereunder, we study the class of irreducible private states that are private states from which all the secret content is accessible via measuring their key part.
K Horodecki +3 more
doaj +1 more source
A Simple, Accurate and Highly Secure Method to Encrypt-Decrypt Digital Images
The digital image may be important and has a secret character, which requires not understanding it when looking at the naked eye or not understanding the contents. So seeking a method of digital image encryption-decryption is a very important task.
Jamil Al-Azzeh, Ziad Alqadi, Qazem Jaber
doaj +1 more source
A new code‐based digital signature based on the McEliece cryptosystem
Digital signature schemes are used for the authentication and verification of signatures. The Courtois–Finiasz–Sendrier (CFS) digital signature is a well‐known code‐based digital signature scheme based on the Niederreiter cryptosystem. However, it is not
Farshid Haidary Makoui +2 more
doaj +1 more source
Architecture and key technologies of 5G power private network
Some main aspects of 5G power private network including network architecture, key technologies and the analysis on the existing key issues aiming to large-scale commercial use were intorduced.Firstly, the service characteristics of power grid was combed ...
Rong WANG +4 more
doaj +2 more sources
Design and parallel implementation on Artix-7 FPGA of the SIMON32/64 Cryptosystem
In the rise of digital transformation, information security is positioned in a prominent place because it provides confidence to society in the use of information technologies. For this reason, there is growing research in this area.
José Gabriel Rincón-González +2 more
doaj
Efficient Quantum Private Comparison without Sharing a Key
Quantum private comparison (QPC) allows at least two users to compare the equality of their secret information, for which the security is based on the properties of quantum mechanics.
Jian Li, Fanting Che, Zhuo Wang, Anqi Fu
doaj +1 more source
Why emerging leaders should focus on being good postdoctoral supervisors
Swamped with work and suddenly a new student is waiting at your doorstep for supervision? Great—this is your chance! In this article, we share tips on how postdocs can strengthen their leadership skills while supervising students. This image has been created using DALL·E. Many postdocs work as leaders later in their career.
Hannah Rostalski +5 more
wiley +1 more source

