Results 41 to 50 of about 383,874 (285)

Enkripsi dan Dekripsi File dengan Algoritma Blowfish pada Perangkat Mobile Berbasis Android

open access: yesJurnal Nasional Teknik Elektro, 2016
Cryptography is one of the ways used to secure data in the form of a file with encrypt files so that others are not entitled to know the file is private and confidential.
Siswo Wardoyo   +2 more
doaj   +1 more source

A Modified Binary Encryption Algorithm based on Diffuse Representation [PDF]

open access: yes, 2017
In the era of Internet, the multimedia data can be used by anyone. There is a chance that unintended users get access to the data so, encryption is needed to hide the multimedia data from the unauthorized users.
Arthy, R. (R)   +4 more
core   +1 more source

Apply Block Ciphers Using Tiny Encryption Algorithm (TEA)

open access: yesمجلة بغداد للعلوم, 2010
Ciphers can be either symmetric-key or public-key. Symmetric-key ciphers are the most famous and important elements in many cryptographic systems. Individually, they provide confidentiality and privacy.
Hana Rashied Ismaeel
doaj   +1 more source

A Trusted Security Key Management Server in LoRaWAN: Modelling and Analysis

open access: yesJournal of Sensor and Actuator Networks, 2022
The traditional Long-Range Wide-Area Network (LoRaWAN) uses an Advanced Encryption Standard (AES) 128 bit symmetric key to secure entities and data against several attacks. However, due to the existence of heterogeneous applications, designing a globally
Koketso Ntshabele   +3 more
doaj   +1 more source

Multi‐omics and low‐input proteomics profiling reveals dynamic regulation driving pluripotency initiation in early mouse embryos

open access: yesFEBS Open Bio, EarlyView.
Mouse pre‐implantation development involves a transition from totipotency to pluripotency. Integrating transcriptomics, epigenetic profiling, low‐input proteomics and functional assays, we show that eight‐cell embryos retain residual totipotency features, whereas cytoskeletal remodeling regulated by the ubiquitin‐proteasome system drives progression ...
Wanqiong Li   +8 more
wiley   +1 more source

Review on DNA Cryptography [PDF]

open access: yes, 2019
Cryptography is the science that secures data and communication over the network by applying mathematics and logic to design strong encryption methods.
Mondal, Mandrita, Ray, Kumar S.
core   +3 more sources

Applications of tripled chaotic maps in cryptography

open access: yes, 2007
Security of information has become a major issue during the last decades. New algorithms based on chaotic maps were suggested for protection of different types of multimedia data, especially digital images and videos in this period. However, many of them
A. Akhavan   +48 more
core   +1 more source

Analysing the significance of small conformational changes and low occupancy states in serial crystallographic data

open access: yesFEBS Open Bio, EarlyView.
This protocol paper outlines methods to establish the success of a time‐resolved serial crystallographic experiment, by means of statistical analysis of timepoint data in reciprocal space and models in real space. We show how to amplify the signal from excited states to visualise structural changes in successful experiments.
Jake Hill   +4 more
wiley   +1 more source

Common lines modeling for reference free ab-initio reconstruction in cryo-EM

open access: yes, 2017
We consider the problem of estimating an unbiased and reference-free ab-inito model for non-symmetric molecules from images generated by single-particle cryo-electron microscopy.
Greenberg, Ido, Shkolnisky, Yoel
core   +1 more source

Diffusion Spectrum Imaging Maps Early Axonal Loss and a Unique Progressive Signal in Neuronal Intranuclear Inclusion Disease

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective To delineate specific in vivo white matter pathology in neuronal intranuclear inclusion disease (NIID) using diffusion spectrum imaging (DSI) and define its clinical relevance. Methods DSI was performed on 42 NIID patients and 38 matched controls.
Kaiyan Jiang   +10 more
wiley   +1 more source

Home - About - Disclaimer - Privacy