DNA origami cryptography for secure communication
نویسندگان
چکیده
منابع مشابه
Quantum Cryptography for Secure Communication in IEEE 802.11 Wireless Networks
IEEE 802.11 is the Wireless Local Area Networks (WLAN) standard developed by the IEEE LAN/MAN Standards Committee. WLANs are increasingly deployed by businesses, government and SOHO users as they offer many advantages to customers with mobility, flexibility and convenience. Wi-Fi is a trademark of the Wi-Fi Alliance that has been used with certified products that belong to a class of WLANs base...
متن کاملNeural Cryptography for Secure Voice Communication using Custom Instructions
Cryptography of resource constrained devices represents a very active area of cryptographic research. Custom instructions have been widely used to achieve the conflicting demands between performance and flexibility. This paper proposes a neural cryptography implementation for secure voice communication using custom instructions to achieve real-time performance on very low resource devices. The ...
متن کاملAn Improved Cryptography Scheme for Secure Image Communication
The traditional chaos algorithm is based on the logistic maps and has some drawbacks. In order to enhance the security, improved chaos system is used. It is based on location Transform and pixel value alteration using random sequence. The proposed algorithm shuffles the image based on the chaotic sequence and change the value of each pixel. The key generates 16 chaotic sequences from given sequ...
متن کاملDNA Cryptography for Secure Data Storage in Cloud
Cloud computing has revolutionized the way the data is stored, processed and made available. It has evolved in various forms of utility computing by sharing resources, infrastructures and data storage facilities and got wide acceptance because of its services and storage capacities. But security issues are a major concern in the cloud which is restricting its use among organizations which deals...
متن کاملDistance-Aware Beamforming for Multiuser Secure Communication Systems
Typical cryptography schemes are not well suited for low complexity types of equipment, e.g., Internet of things (IoT) devices, as they may need high power or impose high computational complexity on the device. Physical (PHY) layer security techniques such as beamforming (in multiple antennas systems) are possible alternatives to provide security for such applications. In this paper, we consid...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Nature Communications
سال: 2019
ISSN: 2041-1723
DOI: 10.1038/s41467-019-13517-3