Results 51 to 60 of about 505,863 (290)
Post-quantum commutative encryption algorithm [PDF]
To provide possibility to design the commutative encryption algorithms on the basis of new versions of the hidden discrete logarithm problem, the term "commutativity" is interpreted in the extended sense.
A.A. Moldovyan +2 more
doaj
A watermarking scheme for a public‐key cryptographic functionality enables the embedding of a mark in the instance of the secret‐key algorithm such that the functionality of the original scheme is maintained, while it is infeasible for an adversary to ...
Foteini Baldimtsi +2 more
doaj +1 more source
Hybrid-structured onion scheme against replay attack of MIX
Replay attack against MIX was studied and a hybrid-structured onion scheme of MIX against replay attack was proposed.In hybrid scheme, probabilistic encryption and semantic security of universal re-encryption were utilized to protect MIX against replay ...
SHI Jin-qiao +3 more
doaj +2 more sources
PICALM::MLLT10 translocated leukemia
This comprehensive review of PICALM::MLLT10 translocated acute leukemia provides an in‐depth review of the structure and function of CALM, AF10, and the fusion oncoprotein (1). The multifaceted molecular mechanisms of oncogenesis, including nucleocytoplasmic shuttling (2), epigenetic modifications (3), and disruption of endocytosis (4), are then ...
John M. Cullen +7 more
wiley +1 more source
High-Security Multi-Slot Chaos Encryption With Dynamic Probability for 16-CAP PON
In this paper, a high-security chaos encryption with dynamic probability for 16-carrier-less amplitude/phase (CAP) PON is proposed by using two-layer chaos map with feedforward neural network-based XOR operator (FNNXOR).
Shun han +8 more
doaj +1 more source
This study explores salivary RNA for breast cancer (BC) diagnosis, prognosis, and follow‐up. High‐throughput RNA sequencing identified distinct salivary RNA signatures, including novel transcripts, that differentiate BC from healthy controls, characterize histological and molecular subtypes, and indicate lymph node involvement.
Nicholas Rajan +9 more
wiley +1 more source
Relating two standard notions of secrecy [PDF]
Two styles of definitions are usually considered to express that a security protocol preserves the confidentiality of a data s. Reachability-based secrecy means that s should never be disclosed while equivalence-based secrecy states that two executions ...
Veronique Cortier +2 more
doaj +1 more source
This study characterizes the responses of primary acute myeloid leukemia (AML) patient samples to the MCL‐1 inhibitor MIK665. The results revealed that monocytic differentiation is associated with MIK665 sensitivity. Conversely, elevated ABCB1 expression is a potential biomarker of resistance to the treatment, which can be overcome by the combination ...
Joseph Saad +17 more
wiley +1 more source
Software encryption: new 64-bit block cryptoscheme [PDF]
There are considered new fast software encryption function and some its cryptographical properties. It has been shown that the probability of the selection of two equivalent keys is very low.
A. Moldovyan, N. Moldovyan, V. Izbash
doaj
In smart cities, the Internet-of-Thing (IoT) provides an enabling communication infrastructure to support tremendous amount of data exchange. Most IoT applications, e.g., wireless local area network, Bluetooth and so forth, utilize the channel-hopping ...
Yiming Liu +4 more
doaj +1 more source

