Results 51 to 60 of about 505,863 (290)

Post-quantum commutative encryption algorithm [PDF]

open access: yesComputer Science Journal of Moldova, 2019
To provide possibility to design the commutative encryption algorithms on the basis of new versions of the hidden discrete logarithm problem, the term "commutativity" is interpreted in the extended sense.
A.A. Moldovyan   +2 more
doaj  

Watermarking public‐key cryptographic functionalities and implementations: The case of encryption and signatures

open access: yesIET Information Security, 2021
A watermarking scheme for a public‐key cryptographic functionality enables the embedding of a mark in the instance of the secret‐key algorithm such that the functionality of the original scheme is maintained, while it is infeasible for an adversary to ...
Foteini Baldimtsi   +2 more
doaj   +1 more source

Hybrid-structured onion scheme against replay attack of MIX

open access: yesTongxin xuebao, 2009
Replay attack against MIX was studied and a hybrid-structured onion scheme of MIX against replay attack was proposed.In hybrid scheme, probabilistic encryption and semantic security of universal re-encryption were utilized to protect MIX against replay ...
SHI Jin-qiao   +3 more
doaj   +2 more sources

PICALM::MLLT10 translocated leukemia

open access: yesFEBS Letters, EarlyView.
This comprehensive review of PICALM::MLLT10 translocated acute leukemia provides an in‐depth review of the structure and function of CALM, AF10, and the fusion oncoprotein (1). The multifaceted molecular mechanisms of oncogenesis, including nucleocytoplasmic shuttling (2), epigenetic modifications (3), and disruption of endocytosis (4), are then ...
John M. Cullen   +7 more
wiley   +1 more source

High-Security Multi-Slot Chaos Encryption With Dynamic Probability for 16-CAP PON

open access: yesIEEE Photonics Journal, 2020
In this paper, a high-security chaos encryption with dynamic probability for 16-carrier-less amplitude/phase (CAP) PON is proposed by using two-layer chaos map with feedforward neural network-based XOR operator (FNNXOR).
Shun han   +8 more
doaj   +1 more source

Characterizing the salivary RNA landscape to identify potential diagnostic, prognostic, and follow‐up biomarkers for breast cancer

open access: yesMolecular Oncology, EarlyView.
This study explores salivary RNA for breast cancer (BC) diagnosis, prognosis, and follow‐up. High‐throughput RNA sequencing identified distinct salivary RNA signatures, including novel transcripts, that differentiate BC from healthy controls, characterize histological and molecular subtypes, and indicate lymph node involvement.
Nicholas Rajan   +9 more
wiley   +1 more source

Relating two standard notions of secrecy [PDF]

open access: yesLogical Methods in Computer Science, 2007
Two styles of definitions are usually considered to express that a security protocol preserves the confidentiality of a data s. Reachability-based secrecy means that s should never be disclosed while equivalence-based secrecy states that two executions ...
Veronique Cortier   +2 more
doaj   +1 more source

Predictors of response and rational combinations for the novel MCL‐1 inhibitor MIK665 in acute myeloid leukemia

open access: yesMolecular Oncology, EarlyView.
This study characterizes the responses of primary acute myeloid leukemia (AML) patient samples to the MCL‐1 inhibitor MIK665. The results revealed that monocytic differentiation is associated with MIK665 sensitivity. Conversely, elevated ABCB1 expression is a potential biomarker of resistance to the treatment, which can be overcome by the combination ...
Joseph Saad   +17 more
wiley   +1 more source

Software encryption: new 64-bit block cryptoscheme [PDF]

open access: yesComputer Science Journal of Moldova, 1997
There are considered new fast software encryption function and some its cryptographical properties. It has been shown that the probability of the selection of two equivalent keys is very low.
A. Moldovyan, N. Moldovyan, V. Izbash
doaj  

Novel channel-hopping pattern-based wireless IoT networks in smart cities for reducing multi-access interference and jamming attacks

open access: yesEURASIP Journal on Wireless Communications and Networking, 2021
In smart cities, the Internet-of-Thing (IoT) provides an enabling communication infrastructure to support tremendous amount of data exchange. Most IoT applications, e.g., wireless local area network, Bluetooth and so forth, utilize the channel-hopping ...
Yiming Liu   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy