Results 41 to 50 of about 383,874 (285)
Enkripsi dan Dekripsi File dengan Algoritma Blowfish pada Perangkat Mobile Berbasis Android
Cryptography is one of the ways used to secure data in the form of a file with encrypt files so that others are not entitled to know the file is private and confidential.
Siswo Wardoyo +2 more
doaj +1 more source
A Modified Binary Encryption Algorithm based on Diffuse Representation [PDF]
In the era of Internet, the multimedia data can be used by anyone. There is a chance that unintended users get access to the data so, encryption is needed to hide the multimedia data from the unauthorized users.
Arthy, R. (R) +4 more
core +1 more source
Apply Block Ciphers Using Tiny Encryption Algorithm (TEA)
Ciphers can be either symmetric-key or public-key. Symmetric-key ciphers are the most famous and important elements in many cryptographic systems. Individually, they provide confidentiality and privacy.
Hana Rashied Ismaeel
doaj +1 more source
A Trusted Security Key Management Server in LoRaWAN: Modelling and Analysis
The traditional Long-Range Wide-Area Network (LoRaWAN) uses an Advanced Encryption Standard (AES) 128 bit symmetric key to secure entities and data against several attacks. However, due to the existence of heterogeneous applications, designing a globally
Koketso Ntshabele +3 more
doaj +1 more source
Mouse pre‐implantation development involves a transition from totipotency to pluripotency. Integrating transcriptomics, epigenetic profiling, low‐input proteomics and functional assays, we show that eight‐cell embryos retain residual totipotency features, whereas cytoskeletal remodeling regulated by the ubiquitin‐proteasome system drives progression ...
Wanqiong Li +8 more
wiley +1 more source
Review on DNA Cryptography [PDF]
Cryptography is the science that secures data and communication over the network by applying mathematics and logic to design strong encryption methods.
Mondal, Mandrita, Ray, Kumar S.
core +3 more sources
Applications of tripled chaotic maps in cryptography
Security of information has become a major issue during the last decades. New algorithms based on chaotic maps were suggested for protection of different types of multimedia data, especially digital images and videos in this period. However, many of them
A. Akhavan +48 more
core +1 more source
This protocol paper outlines methods to establish the success of a time‐resolved serial crystallographic experiment, by means of statistical analysis of timepoint data in reciprocal space and models in real space. We show how to amplify the signal from excited states to visualise structural changes in successful experiments.
Jake Hill +4 more
wiley +1 more source
Common lines modeling for reference free ab-initio reconstruction in cryo-EM
We consider the problem of estimating an unbiased and reference-free ab-inito model for non-symmetric molecules from images generated by single-particle cryo-electron microscopy.
Greenberg, Ido, Shkolnisky, Yoel
core +1 more source
ABSTRACT Objective To delineate specific in vivo white matter pathology in neuronal intranuclear inclusion disease (NIID) using diffusion spectrum imaging (DSI) and define its clinical relevance. Methods DSI was performed on 42 NIID patients and 38 matched controls.
Kaiyan Jiang +10 more
wiley +1 more source

