Results 61 to 70 of about 1,483,203 (289)
BOX: One Minute Volume 3 [PDF]
BOX is a digital short originally developed in 2004 documented on a 1920’s box camera. This early moving image work formed the basis of a practice which interrogates our experience of moving image through the remediation of analogue technology with ...
Butler, Rose
core
ABSTRACT Background Neuromyelitis optica spectrum disorder (NMOSD) is a relapsing autoimmune disease of the central nervous system. High‐dose intravenous methylprednisolone (IVMP) is the standard first‐line therapy for acute attacks, although some patients remain refractory.
Wataru Horiguchi +5 more
wiley +1 more source
An Efficient Generation and Security Analysis of Substitution Box Using Fingerprint Patterns
Information and its security have attracted the research community in recent years with increasing usage of mobile applications. Mobile devices have different security options in data transmission such as reading some biometric values.
Oznur Sengel +2 more
doaj +1 more source
Summary: It is well known that there does not exist a Boolean function \( f\:\mathbb Z^m_2\to \mathbb Z^n_2\) satisfying both basic cryptologic criteria, balancedness and perfect nonlinearity. Previously, \textit{O.~Grošek, L.~ Satko} and \textit{K.~Nemoga} [``Ideal difference tables from an algebraic point of view'', in: P. Caballero-Gil et al. (eds.),
Ladislav Satko +2 more
openaire +2 more sources
CacheZoom: How SGX Amplifies The Power of Cache Attacks [PDF]
In modern computing environments, hardware resources are commonly shared, and parallel computation is widely used. Parallel tasks can cause privacy and security problems if proper isolation is not enforced.
D Brumley +16 more
core +2 more sources
ABSTRACT Introduction Bloodstream infections due to repeated vascular access (VA) puncture and circuit connections remain major concerns in hemodialysis. Therefore, we examined current practices for glove, disinfectant, and personal protective equipment (PPE) use according to VA type in national university hospitals in Japan.
Aiko Yamada +6 more
wiley +1 more source
Cryptographic Features of TWIS Block Cipher
The purpose of the article was to analyze cryptographic features of TWIS block cipher. The S-box probabilistic distribution function and its differential matrix were obtained.
A. V. Arkhangelskaya, Z. A. Chinenova
doaj
VLSI implementation of AES algorithm [PDF]
In the present era of information processing through computers and access of private information over the internet like bank account information even the transaction of money, business deal through video conferencing, encryption of the messages in ...
Kumar, Saurabh
core
Mapping the evolution of mitochondrial complex I through structural variation
Respiratory complex I (CI) is crucial for bioenergetic metabolism in many prokaryotes and eukaryotes. It is composed of a conserved set of core subunits and additional accessory subunits that vary depending on the organism. Here, we categorize CI subunits from available structures to map the evolution of CI across eukaryotes. Respiratory complex I (CI)
Dong‐Woo Shin +2 more
wiley +1 more source
A Strong Hybrid S-Box Scheme Based on Chaos, 2D Cellular Automata and Algebraic Structure
Substitution-boxes are the main deciding components in symmetric-key cryptosystems for resisting many cryptanalytic attacks. It has been a challenging task for the designers to construct strong S-box which satisfies multiple cryptographic properties ...
Amirul Haque +4 more
doaj +1 more source

