Results 51 to 60 of about 40,010 (281)

An Epitome of Multi Secret Sharing Schemes for General Access Structure [PDF]

open access: yes, 2014
Secret sharing schemes are widely used now a days in various applications, which need more security, trust and reliability. In secret sharing scheme, the secret is divided among the participants and only authorized set of participants can recover the ...
Binu, V P, Sreekumar, A
core  

Kak's three-stage protocol of secure quantum communication revisited: Hitherto unknown strengths and weaknesses of the protocol

open access: yes, 2018
Kak's three-stage protocol for quantum key distribution is revisited with special focus on its hitherto unknown strengths and weaknesses. It is shown that this protocol can be used for secure direct quantum communication. Further, the implementability of
Pathak, Anirban, Thapliyal, Kishore
core   +1 more source

Subtype‐specific enhancer RNAs define transcriptional regulators and prognosis in breast cancers

open access: yesMolecular Oncology, EarlyView.
This study employed machine learning methodologies to perform the subtype‐specific classification of RNA‐seq data sets, which are mapped on enhancers from TCGA‐derived breast cancer patients. Their integration with gene expression (referred to as ProxCReAM eRNAs) and chromatin accessibility profiles has the potential to identify lineage‐specific and ...
Aamena Y. Patel   +6 more
wiley   +1 more source

RG-Based (k, n)-Threshold Visual Cryptography with Abilities of OR and XOR Decryption

open access: yesEngineering Proceedings, 2023
A (k, n) visual cryptography (VCS) is used to build a system for secret sharing. The system divides a secret image (S) into n shares and recovers S by stacking shares bigger than or equal to k, while shares below k provide no information about S.
Yu-Ru Lin, Justie Su-Tzu Juan
doaj   +1 more source

Hacking commercial quantum cryptography systems by tailored bright illumination

open access: yes, 2010
The peculiar properties of quantum mechanics allow two remote parties to communicate a private, secret key, which is protected from eavesdropping by the laws of physics. So-called quantum key distribution (QKD) implementations always rely on detectors to
A Lamas-Linares   +27 more
core   +1 more source

Genetic attenuation of ALDH1A1 increases metastatic potential and aggressiveness in colorectal cancer

open access: yesMolecular Oncology, EarlyView.
Aldehyde dehydrogenase 1A1 (ALDH1A1) is a cancer stem cell marker in several malignancies. We established a novel epithelial cell line from rectal adenocarcinoma with unique overexpression of this enzyme. Genetic attenuation of ALDH1A1 led to increased invasive capacity and metastatic potential, the inhibition of proliferation activity, and ultimately ...
Martina Poturnajova   +25 more
wiley   +1 more source

Online Voting System Based on Image Steganography and Visual Cryptography

open access: yesJournal of Computing and Information Technology, 2017
This paper discusses the implementation of an online voting system based on image steganography and visual cryptography. The system was implemented in Java EE on a web-based interface, with MySQL database server and Glassfish application server as the ...
Biju Issac   +2 more
doaj   +1 more source

Threshold Quantum Cryptography

open access: yes, 2013
Most current research on quantum cryptography requires transmission and reception of single photons that creates severe implementation challenges and limits range. This paper argues for the development of threshold quantum cryptography protocols in which the system is secure so long as the number of photons being exchanged between Alice and Bob is ...
openaire   +2 more sources

Network divergence analysis identifies adaptive gene modules and two orthogonal vulnerability axes in pancreatic cancer

open access: yesMolecular Oncology, EarlyView.
Tumors contain diverse cellular states whose behavior is shaped by context‐dependent gene coordination. By comparing gene–gene relationships across biological contexts, we identify adaptive transcriptional modules that reorganize into distinct vulnerability axes.
Brian Nelson   +9 more
wiley   +1 more source

Privacy-Preserving Determination of Secret Interval and Threshold

open access: yesJisuanji kexue yu tansuo, 2020
Secure multi-party computation (SMC) is a research hotspot in cryptography in recent years, and is also a key technology for information security protection.
CHENG Wen, LI Shundong, WANG Wenli
doaj   +1 more source

Home - About - Disclaimer - Privacy