Results 41 to 50 of about 61,999 (289)

Private quantum codes: introduction and connection with higher rank numerical ranges

open access: yes, 2013
We give a brief introduction to private quantum codes, a basic notion in quantum cryptography and key distribution. Private code states are characterized by indistinguishability of their output states under the action of a quantum channel, and we show ...
Kribs, D. W., Plosker, S.
core   +1 more source

SECURE E-MAIL SYSTEM USING S/MIME AND IB-PKC [PDF]

open access: yesمجلة جامعة الانبار للعلوم الصرفة, 2012
Although e-mail security solutions have been introduced for more than two decades, most of the e-mail messages are sent nowadays without being secured by any of these techniques.
MOHAMMED T. IBRAHEM, SUFYAN T. FARAJ
doaj   +1 more source

On the Application of Noiseless Steganography and Elliptic Curves Cryptography Digital Signature Algorithm Methods in Securing Text Messages

open access: yesCauchy: Jurnal Matematika Murni dan Aplikasi, 2022
Elliptic curve cryptography includes symmetric key cryptography systems that base their security on mathematical problems of elliptic curves. There are several ways that can be used to define the elliptic curve equation that depends on the infinite field
Juhari Juhari, Mohamad Febry Andrean
doaj   +1 more source

RETRACTED: Parallel Encryption With Digit Arithmetic Of Covertext Model Using Duplicated Covertext

open access: yesInspiration, 2022
Steganography is the art and science of writing hidden messages or hiding messages in such a way that, apart from the sender and the recipient, no one knows or is aware that there is a secret message (it does not appear that there is a hidden message ...
Hari Murti   +3 more
doaj   +1 more source

New Approach for Encryption Private key for Sender by using Hill Cipher with GGH Cryptography

open access: yes, 2021
One of the important issues in the encryption used in networks is the Hill encryption method, but it is not practical in economic matters or the Internet, It is very difficult to send the private key to the receive in order to decrypt the message, due to the high exposure to third-party attacks, and therefore it is recommended that the private key must
Bermany, Salah AL, Sameer, Majeed Ismael
openaire   +1 more source

Developing evidence‐based, cost‐effective P4 cancer medicine for driving innovation in prevention, therapeutics, patient care and reducing healthcare inequalities

open access: yesMolecular Oncology, EarlyView.
The cancer problem is increasing globally with projections up to the year 2050 showing unfavourable outcomes in terms of incidence and cancer‐related deaths. The main challenges are prevention, improved therapeutics resulting in increased cure rates and enhanced health‐related quality of life.
Ulrik Ringborg   +43 more
wiley   +1 more source

Biometric identity-based cryptography for e-Government environment [PDF]

open access: yes, 2014
Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties. Even though e-Government provides a number of advantages, it also introduces a range of new security risks.
Aljeaid, D, Langensiepen, C, Ma, X
core   +1 more source

Evolutionary dynamics of the chloroplast genome in Daphne (Thymelaeaceae): comparative analysis with related genera and insights into phylogenetics

open access: yesFEBS Open Bio, EarlyView.
Comparative analysis of chloroplast genomes from 14 genera of Thymelaeaceae revealed variation in gene content, ranging from 128 to 142 genes, primarily influenced by IR expansion/contraction events and pseudogenization of ndhF, ndhI, and ndhG. Two large inversions were detected within the large single‐copy region, including a synapomorphic inversion ...
Abdullah   +8 more
wiley   +1 more source

Block encryption of quantum messages [PDF]

open access: yes, 2018
In modern cryptography, block encryption is a fundamental cryptographic primitive. However, it is impossible for block encryption to achieve the same security as one-time pad.
Liang, Min, Yang, Li
core   +1 more source

Agri-Food Traceability Management using a RFID System with Privacy Protection [PDF]

open access: yes, 2007
In this paper an agri-food traceability system based on public key cryptography and Radio Frequency Identification (RFID) technology is proposed. In order to guarantee safety in food, an efficient tracking and tracing system is required.
Bernardi, Paolo   +5 more
core   +2 more sources

Home - About - Disclaimer - Privacy