Results 11 to 20 of about 2,701 (236)

On the security of consumer wearable devices in the Internet of Things. [PDF]

open access: yesPLoS One, 2018
Miniaturization of computer hardware and the demand for network capable devices has resulted in the emergence of a new class of technology called wearable computing.
Tahir H, Tahir R, McDonald-Maier K.
europepmc   +4 more sources

A fast and light stream cipher for smartphones [PDF]

open access: yes, 2013
We present a stream cipher based on a chaotic dynamical system. Using a chaotic trajectory sampled under certain rules in order to avoid any attempt to reconstruct the original one, we create a binary pseudo-random keystream that can only be exactly ...
Baptista, Murilo   +2 more
core   +1 more source

Innate immune receptor NOD2 mediates LGR5+ intestinal stem cell protection against ROS cytotoxicity via mitophagy stimulation [PDF]

open access: yes, 2020
International audienceThe nucleotide-binding oligomerization domain-containing protein 2 (NOD2) agonist muramyl dipeptide (MDP), a peptidoglycan motif common to all bacteria, supports leucine-rich repeat-containing G protein-coupled receptor 5 (LGR5 ...
Deutsch, Eric   +6 more
core   +3 more sources

A Cryptographic Toolbox for Feedback Control Systems [PDF]

open access: yes, 2020
: Feedback control systems consist of components such as sensory systems, state estimators, controllers, and actuators. By transmitting signals between these components across insecure transmission channels, feedback control systems become vulnerable to ...
Solnør, Petter
core   +1 more source

RC4 Encryption-A Literature Survey [PDF]

open access: yes, 2015
A chronological survey demonstrating the cryptanalysis of RC4 stream cipher is presented in this paper. We have summarized the various weaknesses of RC4 algorithm followed by the recently proposed enhancements available in the literature.
Jindal, Poonam, Singh, Brahmjit
core   +1 more source

BLOSTREAM: A HIGH SPEED STREAM CIPHER [PDF]

open access: yesJournal of Engineering Science and Technology, 2017
Although stream ciphers are widely utilized to encrypt sensitive data at fast speeds, security concerns have led to a shift from stream to block ciphers, judging that the current technology in stream cipher is inferior to the technology of block ciphers.
ALI H. KASHMAR, EDDIE S. ISMAIL
doaj  

Privacy region protection for H.264/AVC with enhanced scrambling effect and a low bitrate overhead [PDF]

open access: yes, 2015
While video surveillance systems have become ubiquitous in our daily lives, they have introduced concerns over privacy invasion. Recent research to address these privacy issues includes a focus on privacy region protection, whereby existing video ...
Kurugollu, Fatih   +3 more
core   +2 more sources

Combining Several Substitution Cipher Algorithms using Circular Queue Data Structure [PDF]

open access: yes, 2020
مع التوسع الثوري في الإنترنت ، تتزايد المعلومات العالمية في تطبيق تكنولوجيا الاتصالات، ويعزز النمو السريع لحجم البيانات الكبير الحاجة إلى تحقيق تقنيات آمنة وقوية وواثقة باستخدام خوارزميات فعالة مختلفة.
Hasan, Mokhtar, Ibraheem, Noor
core   +2 more sources

Authenticated Encryption Methods for Feedback Control Systems [PDF]

open access: yes, 2021
Tilbakekoplingssystemer krever at signaler sendes mellom sensorer, tilstandsestimatorer, regulatorer og aktuatorer. Disse signalene er sårbare for tyvlytting, som gjør at uautoriserte aktører kan få kjennskap til potensielt konfidensielle system- og ...
Solnør, Petter
core  

Ccdc11 is a novel centriolar satellite protein essential for ciliogenesis and establishment of left-right asymmetry [PDF]

open access: yes, 2016
The establishment of left–right (L-R) asymmetry in vertebrates is dependent on the sensory and motile functions of cilia during embryogenesis. Mutations in CCDC11 disrupt L-R asymmetry and cause congenital heart disease in humans, yet the molecular and ...
Betleja, Ewelina   +8 more
core   +2 more sources

Home - About - Disclaimer - Privacy