Results 51 to 60 of about 63,410 (288)
KLK7, a tissue kallikrein‐related peptidase, is elevated in advanced colorectal cancer and associated with shorter survival. High KLK7 levels in ascites correlate with peritoneal metastasis. In mice, KLK7 overexpression increases metastasis. In vitro, KLK7 enhances cancer cell proliferation, migration, adhesion, and spheroid formation, driving ...
Yosr Z. Haffani +6 more
wiley +1 more source
Small Private Key MQPKS on an Embedded Microprocessor
Multivariate quadratic (MQ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources.
Hwajeong Seo +5 more
doaj +1 more source
Data Reduction by Huffman Coding and Encryption by Insertion of Shuffled Cyclic Redundancy Code [PDF]
Cryptography today is assumed as the study of techniques and applications of securing the integrity and authenticity of transfer of information under difficult circumstances. It uses mathematical techniques related to aspects of information security such
Patra, Nilkesh, Sankar, Sila Siba
core
LPKI - A Lightweight Public Key Infrastructure for the Mobile Environments
The non-repudiation as an essential requirement of many applications can be provided by the asymmetric key model. With the evolution of new applications such as mobile commerce, it is essential to provide secure and efficient solutions for the mobile ...
Beheshti, A. A., Toorani, M.
core +3 more sources
Objective Australian evidence on lived and care experiences of chronic musculoskeletal shoulder pain (CMSP), irrespective of disorder classification or disease, is limited. However, such evidence is important for person‐centered care and informing local service pathways and care guidelines or standards.
Sonia Ranelli +8 more
wiley +1 more source
Quantum BER estimation modelling and analysis for satellite‐based quantum key distribution scenarios
The quantum communication channel is considered to be eavesdropped when the signal Quantum Bit Error Rate (QBER) exceeds a defined theoretical limit and is thus considered a figure of merit parameter for assessing the security of a quantum channel.
Abhishek Khanna +3 more
doaj +1 more source
Objective This study aims to describe the frequency and timing of physician referrals to physical therapists (PTs) and other treatments prescribed over 12 months in patients with recent onset of knee osteoarthritis (KOA). The study also aims to identify determinants of early PT referrals.
Samannaaz S. Khoja +4 more
wiley +1 more source
A hybrid cryptosystem for cloud security: combining Okamoto-Uchiyama and Advanced Encryption Standard for optimized encryption performance [PDF]
The central challenge in cloud computing is delivering strong data protection while maintaining high system performance. This paper addresses the problem by developing a hybrid cryptosystem that integrates the strengths of Okamoto-Uchiyama (OU) and ...
Azhar Malik
doaj +1 more source
New Approach for Encryption Private key for Sender by using Hill Cipher with GGH Cryptography
One of the important issues in the encryption used in networks is the Hill encryption method, but it is not practical in economic matters or the Internet, It is very difficult to send the private key to the receive in order to decrypt the message, due to the high exposure to third-party attacks, and therefore it is recommended that the private key must
Bermany, Salah AL, Sameer, Majeed Ismael
openaire +1 more source
Image Security using Visual Cryptography [PDF]
Informations are being transferred through open channels and the security of those informations has been prime concerns. Apart from many conventional cryptographic schemes, visual cryptographic techniques have also been in use for data and information ...
Bhuyan, Sangeeta
core

