Results 51 to 60 of about 61,999 (289)

Small Private Key MQPKS on an Embedded Microprocessor

open access: yesSensors, 2014
Multivariate quadratic (MQ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources.
Hwajeong Seo   +5 more
doaj   +1 more source

KLK7 overexpression promotes an aggressive phenotype and facilitates peritoneal dissemination in colorectal cancer cells

open access: yesFEBS Open Bio, EarlyView.
KLK7, a tissue kallikrein‐related peptidase, is elevated in advanced colorectal cancer and associated with shorter survival. High KLK7 levels in ascites correlate with peritoneal metastasis. In mice, KLK7 overexpression increases metastasis. In vitro, KLK7 enhances cancer cell proliferation, migration, adhesion, and spheroid formation, driving ...
Yosr Z. Haffani   +6 more
wiley   +1 more source

Quantum BER estimation modelling and analysis for satellite‐based quantum key distribution scenarios

open access: yesIET Quantum Communication
The quantum communication channel is considered to be eavesdropped when the signal Quantum Bit Error Rate (QBER) exceeds a defined theoretical limit and is thus considered a figure of merit parameter for assessing the security of a quantum channel.
Abhishek Khanna   +3 more
doaj   +1 more source

Lived and Care Experiences of Chronic Musculoskeletal Shoulder Pain in Australian Adults: A Qualitative Study

open access: yesArthritis Care &Research, EarlyView.
Objective Australian evidence on lived and care experiences of chronic musculoskeletal shoulder pain (CMSP), irrespective of disorder classification or disease, is limited. However, such evidence is important for person‐centered care and informing local service pathways and care guidelines or standards.
Sonia Ranelli   +8 more
wiley   +1 more source

Data Reduction by Huffman Coding and Encryption by Insertion of Shuffled Cyclic Redundancy Code [PDF]

open access: yes, 2007
Cryptography today is assumed as the study of techniques and applications of securing the integrity and authenticity of transfer of information under difficult circumstances. It uses mathematical techniques related to aspects of information security such
Patra, Nilkesh, Sankar, Sila Siba
core  

A hybrid cryptosystem for cloud security: combining Okamoto-Uchiyama and Advanced Encryption Standard for optimized encryption performance [PDF]

open access: yesمجلة جامعة الانبار للعلوم الصرفة
The central challenge in cloud computing is delivering strong data protection while maintaining high system performance. This paper addresses the problem by developing a hybrid cryptosystem that integrates the strengths of Okamoto-Uchiyama (OU) and ...
Azhar Malik
doaj   +1 more source

Physician Referral Patterns to Physical Therapists for Managing Knee Osteoarthritis: A Retrospective Analysis of Electronic Health Records from an Integrated Health System

open access: yesArthritis Care &Research, Accepted Article.
Objectives This study aims to describe the frequency and timing of physician referrals to physical therapists (PT) and other treatments prescribed over 12 months in patients with recent onset of knee osteoarthritis (KOA). The study also aims to identify determinants of early PT referrals.
Samannaaz S. Khoja   +4 more
wiley   +1 more source

Image Security using Visual Cryptography [PDF]

open access: yes, 2015
Informations are being transferred through open channels and the security of those informations has been prime concerns. Apart from many conventional cryptographic schemes, visual cryptographic techniques have also been in use for data and information ...
Bhuyan, Sangeeta
core  

SPHINCS$^+$ post-quantum digital signature scheme with Streebog hash function

open access: yes, 2020
Many commonly used public key cryptosystems will become insecure once a scalable quantum computer is built. New cryptographic schemes that can guarantee protection against attacks with quantum computers, so-called post-quantum algorithms, have emerged in
Anufriev, M. N.   +5 more
core   +1 more source

Single Trace Analysis against HyMES by Exploitation of Joint Distributions of Leakages

open access: yesApplied Sciences, 2020
Beginning with the proposal of the McEliece cryptosystem in 1978, code-based cryptography has positioned itself as one of main categories in post-quantum cryptography (PQC).
ByeongGyu Park   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy