Results 71 to 80 of about 47,059 (344)

SDN security control and forwarding method based on cipher identification

open access: yesTongxin xuebao, 2018
Aimed at the limited matching fields and the lack of effective data source authentication mechanism in the software defined networking (SDN),a SDN security control forwarding method based on cipher identification was proposed.First,the cipher ...
Xi QIN, Guodong TANG, Chaowen CHANG
doaj   +2 more sources

Light‐Triggered Protease‐Mediated Release of Actin‐Bound Cargo from Synthetic Cells

open access: yesAdvanced Biology, EarlyView.
TEV Prtoease‐mediated Releasable Actin‐binding Protein (TRAP) is a protein‐based platform consisting of a cargo tightly bound to reconstituted actin networks in synthetic cells which can be proteolyticly released from the bound actin, followed by its secretion through membrane translocation mediated by a cell‐penetrating peptide.
Mousumi Akter   +3 more
wiley   +1 more source

Implementation of super H-antimagic total graph on establishing stream cipher

open access: yesIndonesian Journal of Combinatorics, 2019
This paper is aimed to study the use of super (a, d)-H antimagic total graph on generating encryption keys that can be used to establish a stream cipher. Methodology to achieve this goal was undertaken in three steps. First of all the existence of super (
Antonius Cahya Prihandoko   +2 more
doaj   +1 more source

A New Type of Cipher: DICING_csb [PDF]

open access: yesarXiv, 2008
In this paper, we will propose a new type of cipher named DICING_csb, which is derived from our previous stream cipher DICING. It has applied a stream of subkey and an encryption form of block ciphers, so it may be viewed as a combinative of stream cipher and block cipher. Hence, the new type of cipher has fast rate like a stream cipher and need no MAC.
arxiv  

Smart Rubber Extrusion Line Combining Multiple Sensor Techniques for AI‐Based Process Control

open access: yesAdvanced Engineering Materials, EarlyView.
This publication presents a digitalization approach for a laboratory rubber extrusion line, employing innovative measurement methods and artificial intelligence (AI)‐based process control. The results demonstrate that the measurement systems are capable of detecting changes in the process and extrudate quality.
Alexander Aschemann   +18 more
wiley   +1 more source

An Improved Linear Feedback Shift Register (LFSR- based) Stream Cipher Generator [PDF]

open access: yes, 2009
Linear feedback shift register ( LFSR-based) stream cipher an improved design for a random key generator in a stream cipher algorithm. The proposed random key generator is simply designed to produce a very quick algorithm to be used for securing GSM ...
Mahdi, Reyadh H
core  

Seamless Science: Lifting Experimental Mechanical Testing Lab Data to an Interoperable Semantic Representation

open access: yesAdvanced Engineering Materials, EarlyView.
In pursuit of modern data management techniques, this study presents an in‐lab pipeline combining electronic laboratory notebooks (eLabFTW) and Python scripts for creating semantically enriched, interoperable, machine‐actionable data. Automating data mapping enhances usability, collaboration, and unified knowledge representation.
Markus Schilling   +7 more
wiley   +1 more source

IMPLEMENTASI KRIPTOGRAFI MENGGUNAKAN METODE SHIFT CIPHER, STREAM CIPHER, DAN ELECTRONIC CODE BOOK [PDF]

open access: yes, 2013
Keamanan data merupakan hal yang sangat penting dalam menjaga kerahasiaan pesan terutama yang berisi pesan penting. Dari berbagai macam teknik kriptografi yang berkembang saat ini, dibuat suatu implementasi kriptografi yang kuat menggunakan metode ...
Darlianingrum, Dewi - 085410286
core  

Speech Encryption using Fixed Point Chaos based Stream Cipher (FPC-SC) [PDF]

open access: yesEngineering and Technology Journal, 2016
Fixed point chaos based stream cipher (FPC-SC) is presented in this paper to encrypt the speech signal. Fixed point chaos based pseudo random bit generator (FPC-PRBG) is used as key sequence in stream cipher system. Two chaotic Lorenz and Chen systemsare
Fadhil S. Hasan
doaj   +1 more source

Generation of Efficient Key Bit-Streams Using Sparse Matrix-Vector Multiplication [PDF]

open access: yesarXiv, 2012
The contribution of Stream ciphers to cryptography is immense. For fast encryption, stream ciphers are preferred to block ciphers due to their XORing operation, which is easier and faster to implement. In this paper we present a matrix based stream cipher, in which a m x n binary matrix single handedly performs the work of m parallel LFSRs.
arxiv  

Home - About - Disclaimer - Privacy