Results 51 to 60 of about 16,729,036 (330)
Key exchange with the help of a public ledger
Blockchains and other public ledger structures promise a new way to create globally consistent event logs and other records. We make use of this consistency property to detect and prevent man-in-the-middle attacks in a key exchange such as Diffie-Hellman
A Shamir +9 more
core +1 more source
Lossless and Reversible Data Hiding in Encrypted Images With Public Key Cryptography
— The Lossless data hiding provides the embedding of data in a host image without any loss of data. This research explain a lossless data hiding and image cryptography method based on Choas - Block to image encryption the lossless means if the marked ...
Monika Bartwal, R. Bharti
semanticscholar +1 more source
ABSTRACT We present two pediatric cases of pediatric low‐grade gliomas (PLGG) with BRAF V600E mutations diagnosed and monitored using cerebrospinal fluid (CSF) liquid biopsy analyzed via digital droplet PCR (ddPCR), without tissue biopsy. Both patients were treated with dabrafenib and trametinib and monitored through clinical assessments, magnetic ...
Hannah Sultan +5 more
wiley +1 more source
LPKI - A Lightweight Public Key Infrastructure for the Mobile Environments
The non-repudiation as an essential requirement of many applications can be provided by the asymmetric key model. With the evolution of new applications such as mobile commerce, it is essential to provide secure and efficient solutions for the mobile ...
Beheshti, A. A., Toorani, M.
core +3 more sources
ABSTRACT Ongoing evidence indicates increased risk of sarcopenic obesity among children and young people (CYP) with acute lymphoblastic leukemia (ALL), often beginning early in treatment, persisting into survivorship. This review evaluates current literature on body composition in CYP with ALL during and after treatment.
Lina A. Zahed +5 more
wiley +1 more source
Revocable identity‐based matchmaking encryption in the standard model
Identity‐based Matchmaking Encryption (IB‐ME) is an extension notion of matchmaking encryption (CRYPTO 2019), where a sender and a receiver can specify an access policy for the other party.
Zhe Jiang +5 more
doaj +1 more source
Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage
Searchable encryption is of increasing interest for protecting the data privacy in secure searchable cloud storage. In this paper, we investigate the security of a well-known cryptographic primitive, namely, public key encryption with keyword search ...
Rongmao Chen +4 more
semanticscholar +1 more source
ABSTRACT Introduction Neuroblastoma (NB) with central nervous system (CNS) metastases is rare at diagnosis, but occurs more often during relapse/progression. Patients with CNS metastases face a dismal prognosis, with no standardized curative treatment available.
Vicente Santa‐Maria Lopez +13 more
wiley +1 more source
A Novel Dual Authenticated Encryption Scheme Suitable for Social Networking Services
Nowadays there are many social networking services supporting three-party communication such as Skype, Line, and Facebook Messenger. To ensure the message security, a cryptographic encryption scheme is a commonly adopted measure. However, the traditional
Han-Yu Lin
doaj +1 more source
Public Key Protocols over Twisted Dihedral Group Rings [PDF]
Key management is a central problem in information security. The development of quantum computation could make the protocols we currently use unsecure. Because of that, new structures and hard problems are being proposed. In this work, we give a proposal
Gómez Olvera, María Dolores +2 more
core +1 more source

