Results 61 to 70 of about 1,483,203 (289)

BOX: One Minute Volume 3 [PDF]

open access: yes, 2009
BOX is a digital short originally developed in 2004 documented on a 1920’s box camera. This early moving image work formed the basis of a practice which interrogates our experience of moving image through the remediation of analogue technology with ...
Butler, Rose
core  

Therapeutic Apheresis for Intravenous Methylprednisolone‐Refractory Neuromyelitis Optica Spectrum Disorder: Clinical and Radiological Outcomes in a Single‐Center Case Series

open access: yesTherapeutic Apheresis and Dialysis, EarlyView.
ABSTRACT Background Neuromyelitis optica spectrum disorder (NMOSD) is a relapsing autoimmune disease of the central nervous system. High‐dose intravenous methylprednisolone (IVMP) is the standard first‐line therapy for acute attacks, although some patients remain refractory.
Wataru Horiguchi   +5 more
wiley   +1 more source

An Efficient Generation and Security Analysis of Substitution Box Using Fingerprint Patterns

open access: yesIEEE Access, 2020
Information and its security have attracted the research community in recent years with increasing usage of mobile applications. Mobile devices have different security options in data transmission such as reading some biometric values.
Oznur Sengel   +2 more
doaj   +1 more source

Extremal generalized S-boxes

open access: yesCOMPUTING AND INFORMATICS, 2012
Summary: It is well known that there does not exist a Boolean function \( f\:\mathbb Z^m_2\to \mathbb Z^n_2\) satisfying both basic cryptologic criteria, balancedness and perfect nonlinearity. Previously, \textit{O.~Grošek, L.~ Satko} and \textit{K.~Nemoga} [``Ideal difference tables from an algebraic point of view'', in: P. Caballero-Gil et al. (eds.),
Ladislav Satko   +2 more
openaire   +2 more sources

CacheZoom: How SGX Amplifies The Power of Cache Attacks [PDF]

open access: yes, 2017
In modern computing environments, hardware resources are commonly shared, and parallel computation is widely used. Parallel tasks can cause privacy and security problems if proper isolation is not enforced.
D Brumley   +16 more
core   +2 more sources

Infection Control Practices for Vascular Access Management in Hemodialysis: Results From a Nationwide Survey of Japanese National University Hospitals

open access: yesTherapeutic Apheresis and Dialysis, EarlyView.
ABSTRACT Introduction Bloodstream infections due to repeated vascular access (VA) puncture and circuit connections remain major concerns in hemodialysis. Therefore, we examined current practices for glove, disinfectant, and personal protective equipment (PPE) use according to VA type in national university hospitals in Japan.
Aiko Yamada   +6 more
wiley   +1 more source

Cryptographic Features of TWIS Block Cipher

open access: yesБезопасность информационных технологий, 2012
The purpose of the article was to analyze cryptographic features of TWIS block cipher. The S-box probabilistic distribution function and its differential matrix were obtained.
A. V. Arkhangelskaya, Z. A. Chinenova
doaj  

VLSI implementation of AES algorithm [PDF]

open access: yes, 2013
In the present era of information processing through computers and access of private information over the internet like bank account information even the transaction of money, business deal through video conferencing, encryption of the messages in ...
Kumar, Saurabh
core  

Mapping the evolution of mitochondrial complex I through structural variation

open access: yesFEBS Letters, EarlyView.
Respiratory complex I (CI) is crucial for bioenergetic metabolism in many prokaryotes and eukaryotes. It is composed of a conserved set of core subunits and additional accessory subunits that vary depending on the organism. Here, we categorize CI subunits from available structures to map the evolution of CI across eukaryotes. Respiratory complex I (CI)
Dong‐Woo Shin   +2 more
wiley   +1 more source

A Strong Hybrid S-Box Scheme Based on Chaos, 2D Cellular Automata and Algebraic Structure

open access: yesIEEE Access, 2022
Substitution-boxes are the main deciding components in symmetric-key cryptosystems for resisting many cryptanalytic attacks. It has been a challenging task for the designers to construct strong S-box which satisfies multiple cryptographic properties ...
Amirul Haque   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy