Results 51 to 60 of about 807,165 (362)
Biometric identity-based cryptography for e-Government environment [PDF]
Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties. Even though e-Government provides a number of advantages, it also introduces a range of new security risks.
Aljeaid, D, Langensiepen, C, Ma, X
core +1 more source
COMPARATIVE ANALYSIS OF MOD-ECDH ALGORITHM WITH VARIOUS ALGORITHMS [PDF]
Cryptography is a well-known and well-researched topic for ages. Cryptography is the first line of defense for any networked system. By using Symmetric as well as Asymmetric Cryptography a lot of algorithms are developed. From the security point of view,
O Sri Nagesh, Vankamamidi S Naresh
doaj +1 more source
Security against eavesdropping in quantum cryptography [PDF]
In this article we deal with the security of the BB84 quantum cryptography protocol over noisy channels using generalized privacy amplification. For this we estimate the fraction of bits needed to be discarded during the privacy amplification step.
A. D. Wyner +25 more
core +3 more sources
Vacuolar transport and function of Saccharomyces cerevisiae sterol ester hydrolase Tgl1
Tgl1, one of yeast sterol ester hydrolases, had been found on the lipid droplets where sterol esters are mainly stored. This study revealed that Tgl1 is transported into the vacuole depending on the ESCRT‐I–III complex, and that it exhibits intra‐vacuolar sterol ester hydrolase activity.
Takumi Nakatsuji +5 more
wiley +1 more source
Adaptive authentication and key agreement mechanism for future cellular systems [PDF]
Since the radio medium can be accessed by anyone, authentication of users is a very important element of a mobile network. Nowadays, in GSM/GPRS a challenge response protocol is used to authenticate the user to the mobile network.
Dimitriou, T., Komninos, N.
core
This work presents a contribution to secure the routing protocol GPSR (Greedy Perimeter Stateless Routing) for vehicular ad hoc networks, we examine the possible attacks against GPSR and security solutions proposed by different research teams working on ...
Erritali, Mohammed +2 more
core +1 more source
A nucleotide‐independent, pan‐RAS‐targeted DARPin elicits anti‐tumor activity in a multimodal manner
We report a Designed Ankyrin Repeat Protein that binds and inhibits RAS proteins, which serve as central cell signaling hubs and are essential for the progression of many cancers. Its unique feature is that it does not discriminate between different RAS isoforms or mutations and is capable of binding to RAS in both its active (GTP‐bound) and inactive ...
Jonas N. Kapp +13 more
wiley +1 more source
Symmetric Cryptography (Dagstuhl Seminar 22141)
This report documents the program and the outcomes of Dagstuhl Seminar 20041 "Symmetric Cryptography". The seminar was held on April 3-8, 2022 in Schloss Dagstuhl - Leibniz Center for Informatics. This was the eigth seminar in the series "Symmetric Cryptography". Previous editions were held in 2007, 2009, 2012, 2014, 2016, 2018, and 2022.
Leander, Nils Gregor +4 more
openaire +5 more sources
MATRIKS SCORE DAN APLIKASINYA DALAM PENGAMANAN PESAN RAHASIA
The exchange of general information or confidential information between two persons through a medium does not guarantee its safety. This makes the sender of information and the recipient of information needs to be vigilant. In this case, the role of data
Berny Pebo Tomasouw +2 more
doaj +1 more source
Patterned Cipher Block for Low-Latency Secure Communication
Despite the increasing importance of network security, increasing Internet of Things (IoT) uptake and traffic tends to apply tighter resource constraints for cryptography.
Seounghwan Oh +2 more
doaj +1 more source

