Results 91 to 100 of about 40,010 (281)

A Randomized Kernel-Based Secret Image Sharing Scheme

open access: yes, 2018
This paper proposes a ($k,n$)-threshold secret image sharing scheme that offers flexibility in terms of meeting contrasting demands such as information security and storage efficiency with the help of a randomized kernel (binary matrix) operation.
Akella, Ravi Tej   +2 more
core   +1 more source

Tumor‐stromal crosstalk and macrophage enrichment are associated with chemotherapy response in bladder cancer

open access: yesFEBS Open Bio, EarlyView.
Chemoresistance in bladder cancer: Macrophage recruitment associated with CXCL1, CXCL5 and CXCL8 expression is characteristic of Gemcitabine/Cisplatin (Gem/Cis) Non‐Responder tumors (right side) while Responder tumors did not show substantial tumor‐stromal crosstalk (left side). All biological icons are attributed to Bioicons: carcinoma, cancerous‐cell‐
Sophie Leypold   +11 more
wiley   +1 more source

ADVANCED SECURITY FOR MANETS USING THRESHOLD CRYPTOGRAPHY

open access: yesInternational Journal of Research in Engineering and Technology, 2015
The development of technologies such as Mobile and Adhoc networks have made the distributed environments widely accepted as they allows large scale support for resource sharing infrastructure. One of the challenging issues for such environments is secure authentication.
openaire   +1 more source

The Crypto-democracy and the Trustworthy

open access: yes, 2014
In the current architecture of the Internet, there is a strong asymmetry in terms of power between the entities that gather and process personal data (e.g., major Internet companies, telecom operators, cloud providers, ...) and the individuals from which
Gambs, Sebastien   +2 more
core   +1 more source

HIV‐1 establishes immediate latency in T cells expressing the viral Nef protein

open access: yesFEBS Open Bio, EarlyView.
Nef is a viral protein often omitted from HIV‐1 reporter viruses. Consequently, its role in viral latency is unclear. We developed three novel dual reporter HIV‐1 derivatives that express Nef and allow for detection of latent and productive infection. Using these reporters, we show that Nef does not affect the establishment of immediate viral latency ...
Cindy Lam, Ivan Sadowski
wiley   +1 more source

Quantum-Safe Threshold Cryptography for Decentralized Group Key Management via Dealerless DKG (CRYSTALS–Kyber)

open access: yesMathematics
Post-quantum threshold cryptography requires complete elimination of classical assumptions to achieve genuine quantum resistance. This work presents a fully lattice-based dealerless distributed key generation (DKG) protocol with threshold CRYSTALS–Kyber ...
P.S. Renisha, Bhawana Rudra
doaj   +1 more source

An Efficient Verifiable Threshold Multi-Secret Sharing Scheme With Different Stages

open access: yesIEEE Access, 2019
Secret sharing is one of the most important cryptographic primitives used for data outsourcing. The threshold-based secret sharing scheme is one of the well-known secret sharing schemes in cryptography.
Dong Chen, Wei Lu, Weiwei Xing, Na Wang
doaj   +1 more source

BMI‐1 modulation and trafficking during M phase in diffuse intrinsic pontine glioma

open access: yesFEBS Open Bio, EarlyView.
The schematic illustrates BMI‐1 phosphorylation during M phase, which triggers its translocation from the nucleus to the cytoplasm. In cycling cells, BMI‐1 functions within the PRC1 complex to mediate H2A K119 monoubiquitination. Following PTC596‐induced M phase arrest, phosphorylated BMI‐1 dissociates from PRC1 and is exported to the cytoplasm via its
Banlanjo Umaru   +6 more
wiley   +1 more source

Evolving k-Threshold Visual Cryptography Schemes

open access: yes
In evolving access structures, the number of participants is countably infinite with no predetermined upper bound. While such structures have been realized in secret sharing, research in secret image sharing has primarily focused on visual cryptography schemes (VCS).
Zhuo, Xiaoli   +3 more
openaire   +2 more sources

Key Management Building Blocks for Wireless Sensor Networks [PDF]

open access: yes, 2007
Cryptography is the means to ensure data confidentiality, integrity and authentication in wireless sensor networks (WSNs). To use cryptography effectively however, the cryptographic keys need to be managed properly.
Doumen, J.M., Law, Y.W., Palaniswami, M.
core   +2 more sources

Home - About - Disclaimer - Privacy