Results 71 to 80 of about 10,264,102 (368)

Color Image Encryption Using Hybrid Method of Fractal-Based Key and Private XOR Key [PDF]

open access: yesKirkuk Journal of Science, 2018
The main idea of image encryption is to ensure secure transmitting it in the open network by transforming the image to not understandable form so that unauthorized person cannot decrypt and see it.
Faten H. MohammedSediq   +2 more
doaj   +1 more source

Anonymous and Adaptively Secure Revocable IBE with Constant Size Public Parameters [PDF]

open access: yes, 2012
In Identity-Based Encryption (IBE) systems, key revocation is non-trivial. This is because a user's identity is itself a public key. Moreover, the private key corresponding to the identity needs to be obtained from a trusted key authority through an ...
Chen, Jie   +4 more
core  

Tracking Motor Progression and Device‐Aided Therapy Eligibility in Parkinson's Disease

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective To characterise the progression of motor symptoms and identify eligibility for device‐aided therapies in Parkinson's disease, using both the 5‐2‐1 criteria and a refined clinical definition, while examining differences across genetic subgroups.
David Ledingham   +7 more
wiley   +1 more source

Fault attacks on authenticated encryption modes for GIFT

open access: yesIET Information Security, 2022
There are several authenticated encryption modes for block cipher GIFT in the NIST lightweight cryptography standardisation process. In this study, the authors research on the fault attacks on this kind of authenticated encryption modes and mainly ...
Shuai Liu, Jie Guan, Bin Hu
doaj   +1 more source

Systemic T Cell Receptor Profiling Reveals Adaptive Immune Activation and Potential Immune Signatures of Diagnosis and Brain Atrophy in Epilepsy

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Epilepsy is increasingly associated with immune dysregulation and inflammation. The T cell receptor (TCR), a key mediator of adaptive immunity, shows repertoire alterations in various immune‐mediated diseases. The unique TCR sequence serves as a molecular barcode for T cells, and clonal expansion accompanied by reduced overall TCR ...
Yong‐Won Shin   +12 more
wiley   +1 more source

Practical Inner Product Encryption with Constant Private Key

open access: yesApplied Sciences, 2020
Inner product encryption, first introduced by Katz et al., is a type of predicate encryption in which a ciphertext and a private key correspond to an attribute vector and a predicate vector, respectively.
Yi-Fan Tseng, Zi-Yuan Liu, Raylin Tso
doaj   +1 more source

Post-quantum cryptography-driven security framework for cloud computing

open access: yesOpen Computer Science, 2022
Data security in the cloud has been a major issue since the inception and adoption of cloud computing. Various frameworks have been proposed, and yet data breach prevails.
Ukwuoma Henry Chima   +3 more
doaj   +1 more source

A Comprehensive Overview of the Clinical, Electrophysiological, and Neuroimaging Features of BPAN: Insights From a New Case Series

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background Neurodegeneration with brain iron accumulation (NBIA) comprises a genetically and clinically heterogeneous group of rare neurological disorders characterized particularly by iron accumulation in the basal ganglia. To date, 15 genes have been associated with NBIA.
Seda Susgun   +95 more
wiley   +1 more source

Key-pair(Public key, Private key) conflict analysis using OpenSSL

open access: yesJournal of the Korea Academia-Industrial cooperation Society, 2014
Abstract The development of public-key-based technique that enables a variety of services(E-government, e-banking,e-payment, etc.) evaluated as having complete safety. On the other hand, vulnerabilities(e.g, heartbleed bug, etc.) areconstantly being discovered.
Kwang-Hyoung Lee   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy