Kangaroo A Proposed Stream Cipher Algorithm [PDF]
Stream cipher designers offer new algorithms by employing thecharacteristics of the basic structure to get algorithms that have advanced featuresfrom security and speed stand point of view.
Abdul-Monem S. Rahma+1 more
doaj +2 more sources
On the security of consumer wearable devices in the Internet of Things. [PDF]
Miniaturization of computer hardware and the demand for network capable devices has resulted in the emergence of a new class of technology called wearable computing.
Tahir H, Tahir R, McDonald-Maier K.
europepmc +4 more sources
Performance Analysis of Hybrid Cryptographic Algorithms Rabbit Stream and Enhanced Dual RSA
Cryptography is a technique for encoding data by encrypting plaintext into an unreadable (meaningless) form. Cryptographic methods have good and bad performance depending on the type of algorithm we use. Therefore, the purpose of this study is to measure
Demonius Sarumaha+2 more
semanticscholar +1 more source
A fast and light stream cipher for smartphones [PDF]
We present a stream cipher based on a chaotic dynamical system. Using a chaotic trajectory sampled under certain rules in order to avoid any attempt to reconstruct the original one, we create a binary pseudo-random keystream that can only be exactly ...
Baptista, Murilo+2 more
core +1 more source
Privacy region protection for H.264/AVC with enhanced scrambling effect and a low bitrate overhead [PDF]
While video surveillance systems have become ubiquitous in our daily lives, they have introduced concerns over privacy invasion. Recent research to address these privacy issues includes a focus on privacy region protection, whereby existing video ...
Kurugollu, Fatih+3 more
core +2 more sources
Ccdc11 is a novel centriolar satellite protein essential for ciliogenesis and establishment of left-right asymmetry [PDF]
The establishment of left–right (L-R) asymmetry in vertebrates is dependent on the sensory and motile functions of cilia during embryogenesis. Mutations in CCDC11 disrupt L-R asymmetry and cause congenital heart disease in humans, yet the molecular and ...
Betleja, Ewelina+8 more
core +2 more sources
Innate immune receptor NOD2 mediates LGR5+ intestinal stem cell protection against ROS cytotoxicity via mitophagy stimulation [PDF]
International audienceThe nucleotide-binding oligomerization domain-containing protein 2 (NOD2) agonist muramyl dipeptide (MDP), a peptidoglycan motif common to all bacteria, supports leucine-rich repeat-containing G protein-coupled receptor 5 (LGR5 ...
Deutsch, Eric+6 more
core +3 more sources
BLOSTREAM: A HIGH SPEED STREAM CIPHER [PDF]
Although stream ciphers are widely utilized to encrypt sensitive data at fast speeds, security concerns have led to a shift from stream to block ciphers, judging that the current technology in stream cipher is inferior to the technology of block ciphers.
ALI H. KASHMAR, EDDIE S. ISMAIL
doaj
A survey of communication protocols for internet of things and related challenges of fog and cloud computing integration [PDF]
The fast increment in the number of IoT (Internet of Things) devices is accelerating the research on new solutions to make cloud services scalable.
Carpio, Francisco+3 more
core +4 more sources
Master of puppets: analyzing and attacking a botnet for fun and profit [PDF]
A botnet is a network of compromised machines (bots), under the control of an attacker. Many of these machines are infected without their owners’ knowledge, and botnets are the driving force behind several misuses and criminal activities on the ...
Saito, Genki, Stringhini, Gianluca
core +2 more sources