Results 41 to 50 of about 49,036 (287)

MATRIKS SCORE DAN APLIKASINYA DALAM PENGAMANAN PESAN RAHASIA

open access: yesBarekeng, 2018
The exchange of general information or confidential information between two persons through a medium does not guarantee its safety. This makes the sender of information and the recipient of information needs to be vigilant. In this case, the role of data
Berny Pebo Tomasouw   +2 more
doaj   +1 more source

Patterned Cipher Block for Low-Latency Secure Communication

open access: yesIEEE Access, 2020
Despite the increasing importance of network security, increasing Internet of Things (IoT) uptake and traffic tends to apply tighter resource constraints for cryptography.
Seounghwan Oh   +2 more
doaj   +1 more source

A Contribution to Secure the Routing Protocol "Greedy Perimeter Stateless Routing" Using a Symmetric Signature-Based AES and MD5 Hash

open access: yes, 2011
This work presents a contribution to secure the routing protocol GPSR (Greedy Perimeter Stateless Routing) for vehicular ad hoc networks, we examine the possible attacks against GPSR and security solutions proposed by different research teams working on ...
Erritali, Mohammed   +2 more
core   +1 more source

Analysis of the Security of BB84 by Model Checking [PDF]

open access: yes, 2010
Quantum Cryptography or Quantum key distribution (QKD) is a technique that allows the secure distribution of a bit string, used as key in cryptographic protocols.
Azizi, Abdelmalek   +2 more
core   +2 more sources

Diversity and complexity in neural organoids

open access: yesFEBS Letters, EarlyView.
Neural organoid research aims to expand genetic diversity on one side and increase tissue complexity on the other. Chimeroids integrate multiple donor genomes within single organoids. Self‐organising multi‐identity organoids, exogenous cell seeding, or enforced assembly of region‐specific organoids contribute to tissue complexity.
Ilaria Chiaradia, Madeline A. Lancaster
wiley   +1 more source

PERANCANGAN PROGRAM APLIKASI AUDIO STEGANOGRAFI DENGAN MENGGUNAKAN METODE KRIPTOGRAFI RIJNDAEL ADVANCED ENCRYPTION STANDARD [PDF]

open access: yes, 2009
PERANCANGAN PROGRAM APLIKASI AUDIO STEGANOGRAFI DENGAN MENGGUNAKAN METODE KRIPTOGRAFI RIJNDAEL ADVANCED ENCRYPTION STANDARD - Steganography, Rijndael, Advanced Encryption Standard (AES), Symmetric Cryptography, Cryptography, Least Significant Bit ...
MARCHELL SUHARJA, YAN
core  

Using quantum key distribution for cryptographic purposes: a survey

open access: yes, 2014
The appealing feature of quantum key distribution (QKD), from a cryptographic viewpoint, is the ability to prove the information-theoretic security (ITS) of the established keys. As a key establishment primitive, QKD however does not provide a standalone
,   +23 more
core   +3 more sources

From Quantum Cheating to Quantum Security [PDF]

open access: yes, 2000
For thousands of years, code-makers and code-breakers have been competing for supremacy. Their arsenals may soon include a powerful new weapon: quantum mechanics. We give an overview of quantum cryptology as of November 2000.Comment: 14 pages, 4 figures.
Gottesman, Daniel, Lo, Hoi-Kwong
core   +4 more sources

EDNRB‐dependent endothelin signaling reduces proliferation and promotes proneural‐to‐mesenchymal transition in gliomas

open access: yesMolecular Oncology, EarlyView.
Glioma cells mainly express the endothelin receptor EDNRB, while EDNRA is restricted to a perivascular tumor subpopulation. Endothelin signaling reduces glioma cell proliferation while promoting migration and a proneural‐to‐mesenchymal transition associated with poor prognosis. This pathway activates Ca2+, K+, ERK, and STAT3 signalings and is regulated
Donovan Pineau   +36 more
wiley   +1 more source

Codes for Key Generation in Quantum Cryptography

open access: yes, 2005
As an alternative to the usual key generation by two-way communication in schemes for quantum cryptography, we consider codes for key generation by one-way communication.
BERTHOLD-GEORG ENGLERT   +6 more
core   +2 more sources

Home - About - Disclaimer - Privacy