Results 31 to 40 of about 3,565 (253)
RETRACTED: Parallel Encryption With Digit Arithmetic Of Covertext Model Using Duplicated Covertext
Steganography is the art and science of writing hidden messages or hiding messages in such a way that, apart from the sender and the recipient, no one knows or is aware that there is a secret message (it does not appear that there is a hidden message ...
Hari Murti +3 more
doaj +1 more source
Five‐Year Disease Progression in Synuclein Seeding Positive Sporadic Parkinson's Disease
ABSTRACT Objective To provide a comprehensive description of disease progression in synuclein seeding assay (SAA) positive sporadic Parkinson Disease participants, using Neuronal Synuclein Disease integrated biological and functional impairment staging framework.
Paulina Gonzalez‐Latapi +19 more
wiley +1 more source
A Secure Visual Cryptography Scheme Using Private Key with Invariant Share Sizes
Visual cryptography (VC) is one of the best techniques used to secure information. It uses the human vision to decrypt the encrypted images without any cryptographic computations. The basic concept of visual cryptography is splitting the secret image into shares such that when the shares are stacked, the secret image is revealed.
Rola I. Al-Khalid +4 more
openaire +2 more sources
Objective This study aims to describe the frequency and timing of physician referrals to physical therapists (PTs) and other treatments prescribed over 12 months in patients with recent onset of knee osteoarthritis (KOA). The study also aims to identify determinants of early PT referrals.
Samannaaz S. Khoja +4 more
wiley +1 more source
Quantum BER estimation modelling and analysis for satellite‐based quantum key distribution scenarios
The quantum communication channel is considered to be eavesdropped when the signal Quantum Bit Error Rate (QBER) exceeds a defined theoretical limit and is thus considered a figure of merit parameter for assessing the security of a quantum channel.
Abhishek Khanna +3 more
doaj +1 more source
A hybrid cryptosystem for cloud security: combining Okamoto-Uchiyama and Advanced Encryption Standard for optimized encryption performance [PDF]
The central challenge in cloud computing is delivering strong data protection while maintaining high system performance. This paper addresses the problem by developing a hybrid cryptosystem that integrates the strengths of Okamoto-Uchiyama (OU) and ...
Azhar Malik
doaj +1 more source
Function Codes For Protection Of Key In Private Key Cryptography
In order to check the applicability and correctness of any designed algorithm, it is must to write a code on any suitable platform that successfully implements the logic. The present work is actually an extension to what we have done in our previous works where we have tried to devise an algorithm which is based on the most popular and largely applied ...
Agarwal, Ashish +4 more
openaire +1 more source
Objective We developed a novel EHR sidecar application to visualize key rheumatoid arthritis (RA) outcomes, including disease activity, physical function, and pain, via a patient‐facing graphical interface designed for use during outpatient visits (“RA PRO dashboard”).
Gabriela Schmajuk +16 more
wiley +1 more source
Small Private Key MQPKS on an Embedded Microprocessor
Multivariate quadratic (MQ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources.
Hwajeong Seo +5 more
doaj +1 more source
New Approach for Encryption Private key for Sender by using Hill Cipher with GGH Cryptography
One of the important issues in the encryption used in networks is the Hill encryption method, but it is not practical in economic matters or the Internet, It is very difficult to send the private key to the receive in order to decrypt the message, due to the high exposure to third-party attacks, and therefore it is recommended that the private key must
Bermany, Salah AL, Sameer, Majeed Ismael
openaire +1 more source

