Results 21 to 30 of about 3,565 (253)

Program for Simulation and Testing of Apply Cryptography of Advance Encryption Standard (AES) Algorithm with Rivest-Shamir-Adleman (RSA) Algorithm for Good Performance [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2022
Nowadays, information security management systems are important parts of managing a system for better handling of the information security. In scenarios and situations where safety management is done by managing protection of malwares, it is important to
Santi Pattanavichai
doaj   +1 more source

Identity-based key-insulated aggregate signature scheme

open access: yesJournal of King Saud University: Computer and Information Sciences, 2017
Private key exposure can be the most devastating attack on cryptographic schemes; as such exposure leads to the breakage of security of the scheme as a whole. In the real world scenario, this problem is perhaps the biggest threat to cryptography.
P. Vasudeva Reddy, P.V.S.S.N. Gopal
doaj   +1 more source

IMPLEMENTATION OF BLOM’S KEY PREDISTRIBUTION SCHEME BY USING ELLIPTIC CURVE CRYPTOGRAPHY

open access: yesMalaysian Journal of Computing, 2021
Cryptography, along with its various methods is used to serve the security communication purpose. Cryptography is said to be secure if the encryption key is hard to break by the attacker.
Md Nizam Udin   +5 more
doaj   +1 more source

A Practical Analysis of the Fermat Factorization and Pollard Rho Method for Factoring Integers

open access: yesLontar Komputer, 2021
The development of public-key cryptography generation using the factoring method is very important in practical cryptography applications. In cryptographic applications, the urgency of factoring is very risky because factoring can crack public and ...
Aminudin Aminudin, Eko Budi Cahyono
doaj   +1 more source

Secure E-Mail System Using S/Mime and Ib-Pkc [PDF]

open access: yesEngineering and Technology Journal, 2007
Although e-mail security solutions have been introduced formore than two decades, most of the e-mail messages are sent nowadayswithout being secured by any of these techniques.
Sufyan Faraj, Mohammed Ibrahem
doaj   +1 more source

SECURE E-MAIL SYSTEM USING S/MIME AND IB-PKC [PDF]

open access: yesمجلة جامعة الانبار للعلوم الصرفة, 2012
Although e-mail security solutions have been introduced for more than two decades, most of the e-mail messages are sent nowadays without being secured by any of these techniques.
MOHAMMED T. IBRAHEM, SUFYAN T. FARAJ
doaj   +1 more source

The HIT Network for Children and Adolescents With CNS Tumors Facilitates Improvements of Diagnostic Assessments, Multimodal Treatments, Individual Counseling, and Research in Germany, Austria, and Switzerland

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background The HIT network was established in 2000 to create a population‐based structure aiming to improve survival rates and reduce late effects for children with central nervous system (CNS) tumors by conducting comprehensive clinical trials.
Stefan Rutkowski   +59 more
wiley   +1 more source

On the Application of Noiseless Steganography and Elliptic Curves Cryptography Digital Signature Algorithm Methods in Securing Text Messages

open access: yesCauchy: Jurnal Matematika Murni dan Aplikasi, 2022
Elliptic curve cryptography includes symmetric key cryptography systems that base their security on mathematical problems of elliptic curves. There are several ways that can be used to define the elliptic curve equation that depends on the infinite field
Juhari Juhari, Mohamad Febry Andrean
doaj   +1 more source

KLK7 overexpression promotes an aggressive phenotype and facilitates peritoneal dissemination in colorectal cancer cells

open access: yesFEBS Open Bio, EarlyView.
KLK7, a tissue kallikrein‐related peptidase, is elevated in advanced colorectal cancer and associated with shorter survival. High KLK7 levels in ascites correlate with peritoneal metastasis. In mice, KLK7 overexpression increases metastasis. In vitro, KLK7 enhances cancer cell proliferation, migration, adhesion, and spheroid formation, driving ...
Yosr Z. Haffani   +6 more
wiley   +1 more source

EthVault: A Secure and Resource‐Conscious FPGA‐Based Ethereum Cold Wallet

open access: yesIET Blockchain
Cryptocurrency blockchain networks safeguard digital assets using cryptographic keys, with wallets playing a critical role in generating, storing, and managing these keys.
Joel Poncha Lemayian   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy