Results 71 to 80 of about 405,500 (194)

A SAT-based Public Key Cryptography Scheme [PDF]

open access: yesarXiv, 2015
A homomorphic public key crypto-scheme based on the Boolean Satisfiability Problem is proposed. The public key is a SAT formula satisfied by the private key. Probabilistic encryption generates functions implied to be false by the public key XOR the message bits. A zero-knowledge proof is used to provide signatures.
arxiv  

LPKI - A Lightweight Public Key Infrastructure for the Mobile Environments

open access: yes, 2008
The non-repudiation as an essential requirement of many applications can be provided by the asymmetric key model. With the evolution of new applications such as mobile commerce, it is essential to provide secure and efficient solutions for the mobile ...
Beheshti, A. A., Toorani, M.
core   +3 more sources

Public Key Cryptography for 5G Private Identification [PDF]

open access: yes, 2020
Den neste generasjonen mobilnett blir kalt 5G. 5G introduserer flere forbedringer i forhold til den forrige generasjonen, kjent som Long Term Evolution (LTE). Noen av disse forbedringene gjelder personvernet til abonnentene.
Halland, Julie Fylkesnes
core  

Molecular and functional profiling unravels targetable vulnerabilities in colorectal cancer

open access: yesMolecular Oncology, EarlyView.
We used whole exome and RNA‐sequencing to profile divergent genomic and transcriptomic landscapes of microsatellite stable (MSS) and microsatellite instable (MSI) colorectal cancer. Alterations were classified using a computational score for integrative cancer variant annotation and prioritization.
Efstathios‐Iason Vlachavas   +15 more
wiley   +1 more source

Assessment of Work Pedestal on RSA in Text Cryptographic System [PDF]

open access: yes, 2018
Cryptography is a Greek word, crypto signifies ‘hidden or covered up’ and graphy means ‘study’. The conversion of plain text to cipher text is called as encryption and changing the cipher text to plain text is called as decryption.
Panwar , Aashish   +2 more
core   +1 more source

Stroma gene signature predicts responsiveness to chemotherapy in pancreatic ductal adenocarcinoma patient‐derived xenograft models

open access: yesMolecular Oncology, EarlyView.
Pancreatic ductal adenocarcinoma patient‐derived xenografts (PDAC‐PDXs) engrafted orthotopically in the pancreas of immunodeficient mice retain the main genetic and histopathological characteristics of the original human tumors. A 294 stroma gene signature differentiates between PDAC‐PDXs that are responsive to gemcitabine plus nab‐paclitaxel versus ...
Alessia Anastasia   +13 more
wiley   +1 more source

Discovery of Elliptic Curve Cryptographic Private Key in O(n) [PDF]

open access: yesarXiv, 2009
An algorithm is presented that in context of public key use of Elliptic Curve Cryptography allows discovery of the private key in worst case O(n).
arxiv  

Analisis Dan Implementasi Algoritma Kriptografi Kunci Publik Rsa Dan Luc Untuk Penyandian Data [PDF]

open access: yes, 2015
The use of data communication networks between various computer systems have developed rapidly in various fields, so that the necessary existence of other systems maintain the confidentiality and security of data exchange.In handling the security and ...
Setiaji, B. (Bayu)
core  

Classification of acute myeloid leukemia based on multi‐omics and prognosis prediction value

open access: yesMolecular Oncology, EarlyView.
The Unsupervised AML Multi‐Omics Classification System (UAMOCS) integrates genomic, methylation, and transcriptomic data to categorize AML patients into three subtypes (UAMOCS1‐3). This classification reveals clinical relevance, highlighting immune and chromosomal characteristics, prognosis, and therapeutic vulnerabilities.
Yang Song   +13 more
wiley   +1 more source

A Matrix Public Key Cryptosystem [PDF]

open access: yesarXiv, 2015
We discuss a matrix public key cryptosystem and its numerical implementation.
arxiv  

Home - About - Disclaimer - Privacy