Results 71 to 80 of about 80,772 (303)

First end‐to‐end PQC protected DPU‐to‐DPU communications

open access: yesElectronics Letters, 2023
The appearance of quantum computing in the short foreseeable future and its capability to break conventional cryptographic algorithms forces to change the paradigm of secure real‐time communications.
A. Cano Aguilera   +4 more
doaj   +1 more source

Public-key cryptography and invariant theory

open access: yes, 2002
Public-key cryptosystems are suggested based on invariants of groups.
Grigoriev, D.
core   +1 more source

Unraveling LINE‐1 retrotransposition in head and neck squamous cell carcinoma

open access: yesMolecular Oncology, EarlyView.
The novel RetroTest method allows the detection of L1 activation in clinical samples with low DNA input, providing global L1 activity and the identification of the L1 source element. We applied RetroTest to a real‐world cohort of HNSCC patients where we reported an early L1 activation, with more than 60% of T1 patients showing L1 activity.
Jenifer Brea‐Iglesias   +12 more
wiley   +1 more source

Some cryptographic algorithms [PDF]

open access: yes, 2014
Cryptography is the practice and study of techniques for secure communication in the presence of third parties, called adversaries. Modern cryptography is heavily based on mathematical theory and computer science practice.
Satpathy, S
core  

EGFR‐STAT3 activation provides a therapeutic rationale for targeting aggressive ETV1‐positive prostate cancer

open access: yesMolecular Oncology, EarlyView.
Cotargeting EGFR and STAT3 with Erlotinib and TTI‐101 impairs both 2D and 3D growth of ETV1‐overexpressing prostate cancer cells by disrupting a self‐sustaining ETV1–EGFR positive feedback loop that promotes EGFR and STAT3 expression and phosphorylation (activation).
Elsa Gomes Paiva   +5 more
wiley   +1 more source

Quantum Key Distribution for V2I communications with software‐defined networking

open access: yesIET Quantum Communication
The evolution of Connected and Autonomous Vehicles (CAVs) promises improvements in our travel experience and the potential to enhance road safety and reduce environmental impact.
Alexandros Stavdas   +9 more
doaj   +1 more source

Association of high‐dose radioactive iodine therapy with PPM1D‐mutated clonal hematopoiesis in older individuals

open access: yesMolecular Oncology, EarlyView.
In thyroid cancer patients, high‐dose (≥7.4 GBq) radioactive iodine therapy (RAIT) was associated with a higher prevalence of clonal hematopoiesis (variant allele frequency >2%) in individuals aged ≥50 years (OR = 2.44). In silico analyses showed that truncating PPM1D mutations conferred a selective advantage under these conditions.
Jaeryuk Kim   +11 more
wiley   +1 more source

Novel Architecture for Efficient Implementation of Modular Exponentiation Algorithm [PDF]

open access: yesInternational Journal of Web Research
One of the most difficult problems in web research is security. Cryptography is the fundamental technique utilized in secure communication. One key element of cryptography is Public-Key Cryptography (PKC).
Abdalhossein Rezai
doaj   +1 more source

Survey on SAP and its application in public-key cryptography

open access: yesJournal of Mathematical Cryptology, 2020
The concept of the semigroup action problem (SAP) was first introduced by Monico in 2002. Monico explained in his paper that the discrete logarithm problem (DLP) can be generalized to SAP. After defining the action problem in a semigroup, the concept was
Goel Neha, Gupta Indivar, Dass B. K.
doaj   +1 more source

Image Security using Visual Cryptography [PDF]

open access: yes, 2015
Informations are being transferred through open channels and the security of those informations has been prime concerns. Apart from many conventional cryptographic schemes, visual cryptographic techniques have also been in use for data and information ...
Bhuyan, Sangeeta
core  

Home - About - Disclaimer - Privacy