Results 41 to 50 of about 49,036 (287)
MATRIKS SCORE DAN APLIKASINYA DALAM PENGAMANAN PESAN RAHASIA
The exchange of general information or confidential information between two persons through a medium does not guarantee its safety. This makes the sender of information and the recipient of information needs to be vigilant. In this case, the role of data
Berny Pebo Tomasouw +2 more
doaj +1 more source
Patterned Cipher Block for Low-Latency Secure Communication
Despite the increasing importance of network security, increasing Internet of Things (IoT) uptake and traffic tends to apply tighter resource constraints for cryptography.
Seounghwan Oh +2 more
doaj +1 more source
This work presents a contribution to secure the routing protocol GPSR (Greedy Perimeter Stateless Routing) for vehicular ad hoc networks, we examine the possible attacks against GPSR and security solutions proposed by different research teams working on ...
Erritali, Mohammed +2 more
core +1 more source
Analysis of the Security of BB84 by Model Checking [PDF]
Quantum Cryptography or Quantum key distribution (QKD) is a technique that allows the secure distribution of a bit string, used as key in cryptographic protocols.
Azizi, Abdelmalek +2 more
core +2 more sources
Diversity and complexity in neural organoids
Neural organoid research aims to expand genetic diversity on one side and increase tissue complexity on the other. Chimeroids integrate multiple donor genomes within single organoids. Self‐organising multi‐identity organoids, exogenous cell seeding, or enforced assembly of region‐specific organoids contribute to tissue complexity.
Ilaria Chiaradia, Madeline A. Lancaster
wiley +1 more source
PERANCANGAN PROGRAM APLIKASI AUDIO STEGANOGRAFI DENGAN MENGGUNAKAN METODE KRIPTOGRAFI RIJNDAEL ADVANCED ENCRYPTION STANDARD [PDF]
PERANCANGAN PROGRAM APLIKASI AUDIO STEGANOGRAFI DENGAN MENGGUNAKAN METODE KRIPTOGRAFI RIJNDAEL ADVANCED ENCRYPTION STANDARD - Steganography, Rijndael, Advanced Encryption Standard (AES), Symmetric Cryptography, Cryptography, Least Significant Bit ...
MARCHELL SUHARJA, YAN
core
Using quantum key distribution for cryptographic purposes: a survey
The appealing feature of quantum key distribution (QKD), from a cryptographic viewpoint, is the ability to prove the information-theoretic security (ITS) of the established keys. As a key establishment primitive, QKD however does not provide a standalone
, +23 more
core +3 more sources
From Quantum Cheating to Quantum Security [PDF]
For thousands of years, code-makers and code-breakers have been competing for supremacy. Their arsenals may soon include a powerful new weapon: quantum mechanics. We give an overview of quantum cryptology as of November 2000.Comment: 14 pages, 4 figures.
Gottesman, Daniel, Lo, Hoi-Kwong
core +4 more sources
Glioma cells mainly express the endothelin receptor EDNRB, while EDNRA is restricted to a perivascular tumor subpopulation. Endothelin signaling reduces glioma cell proliferation while promoting migration and a proneural‐to‐mesenchymal transition associated with poor prognosis. This pathway activates Ca2+, K+, ERK, and STAT3 signalings and is regulated
Donovan Pineau +36 more
wiley +1 more source
Codes for Key Generation in Quantum Cryptography
As an alternative to the usual key generation by two-way communication in schemes for quantum cryptography, we consider codes for key generation by one-way communication.
BERTHOLD-GEORG ENGLERT +6 more
core +2 more sources

