Results 31 to 40 of about 16,624 (253)

Hybrid lightweight cryptography with attribute-based encryption standard for secure and scalable IoT system

open access: yesConnection Science, 2022
Internet of Things (IoT) devices require lower power consumption with higher security, which can be achieved by using lightweight cryptography (LWC) approaches. Attribute-based encryption (ABE) provides a fine-grained access control policy over encrypted
Mounika Jammula   +2 more
doaj   +1 more source

A Secure and Resilient Scheme for Telecare Medical Information Systems With Threat Modeling and Formal Verification

open access: yesIEEE Access, 2022
Telecare Medical Information Systems (TMIS) is a highly focused and unique domain providing healthcare services remotely, the development and advancement in the realm of information and communication technologies boosted the development of TMIS ...
Shaik Shakeel Ahamad   +2 more
doaj   +1 more source

WAS: improved white-box cryptographic algorithm over AS iteration

open access: yesCybersecurity, 2023
The attacker in white-box model has full access to software implementation of a cryptographic algorithm and full control over its execution environment.
Yatao Yang   +3 more
doaj   +1 more source

Experimental realization of a highly secure chaos communication under strong channel noise

open access: yes, 2004
A one-way coupled spatiotemporally chaotic map lattice is used to contruct cryptosystem. With the combinatorial applications of both chaotic computations and conventional algebraic operations, our system has optimal cryptographic properties much better ...
Blahut   +28 more
core   +1 more source

Quantum states with a positive partial transpose are useful for metrology [PDF]

open access: yes, 2018
We show that multipartite quantum states that have a positive partial transpose with respect to all bipartitions of the particles can outperform separable states in linear interferometers. We introduce a powerful iterative method to find such states.
Tóth, Géza, Vértesi, Tamás
core   +2 more sources

Security proof for cryptographic protocols based only on the monogamy of Bell's inequality violations

open access: yes, 2010
We show that monogamy of Bell's inequality violations, which is strictly weaker condition than no-signaling is enough to prove security of quantum key distribution.
Pawlowski, Marcin
core   +1 more source

Entangled photon apparatus for the undergraduate laboratory

open access: yes, 2002
We present detailed instructions for constructing and operating an apparatus to produce and detect polarization-entangled photons. The source operates by type-I spontaneous parametric downconversion in a two-crystal geometry.
Bell J. S.   +2 more
core   +1 more source

In situ molecular organization and heterogeneity of the Legionella Dot/Icm T4SS

open access: yesFEBS Letters, EarlyView.
We present a nearly complete in situ model of the Legionella Dot/Icm type IV secretion system, revealing its central secretion channel and identifying new components. Using cryo‐electron tomography with AI‐based modeling, our work highlights the structure, variability, and mechanism of this complex nanomachine, advancing understanding of bacterial ...
Przemysław Dutka   +11 more
wiley   +1 more source

A methionine‐lined active site governs carbocation stabilization and product specificity in a bacterial terpene synthase

open access: yesFEBS Letters, EarlyView.
This study reveals a unique active site enriched in methionine residues and demonstrates that these residues play a critical role by stabilizing carbocation intermediates through novel sulfur–cation interactions. Structure‐guided mutagenesis further revealed variants with significantly altered product profiles, enhancing pseudopterosin formation. These
Marion Ringel   +13 more
wiley   +1 more source

Systematization of a 256-bit lightweight block cipher Marvin [PDF]

open access: yes, 2018
In a world heavily loaded by information, there is a great need for keeping specific information secure from adversaries. The rapid growth in the research field of lightweight cryptography can be seen from the list of the number of lightweight stream as ...
Bhattacharya, Abhishek   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy