Academic literature on the topic 'Crypter'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Crypter.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Crypter"

1

Mewada, Shivlal, Pradeep Sharma, and S. S. Gautam. "Investigation of Efficient Cryptic Algorithm for Text using SM Crypter." International Journal of Information Science and Computing 3, no. 2 (2016): 99. http://dx.doi.org/10.5958/2454-9533.2016.00012.0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Brochet, Laura. "D�crypter, comprendre�et ma�triser sa pr�sence en ligne." L'Observatoire N�47, no. 1 (2016): 94. http://dx.doi.org/10.3917/lobs.047.0094.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Brisset, Annie. "Traduire le texte dans son projet. Le littéralisme est soluble dans la poésie moderne : Auden." TTR : traduction, terminologie, rédaction 12, no. 2 (2007): 39–56. http://dx.doi.org/10.7202/037370ar.

Full text
Abstract:
Résumé Traduire le texte dans son projet. Le littéralisme est soluble dans la poésie moderne : Auden — Bien qu'il soit reconnu comme l'un des plus grands poètes du XXe siècle, W. H. Auden est peu traduit en français. Son oeuvre, il est vrai, résiste à la traduction lorsqu'elle s'amuse, comme dans le poème qui sert ici d'exemple, à crypter le langage de tous les jours en le coulant dans une forme contrainte par la tradition. « The Three Companions » est un poème clé dans l'oeuvre d'Auden qui le publie au début des années trente et le reconduit dans plusieurs de ses recueils. Nous en proposons une analyse qui ouvre un dialogue avec chacune des traductions (une dizaine) et avec les commentaires qui les accompagnent.
APA, Harvard, Vancouver, ISO, and other styles
4

Bachmann, O., B. Riederer, H. Rossmann, et al. "The Na+/H+ exchanger isoform 2 is the predominant NHE isoform in murine colonic crypts and its lack causes NHE3 upregulation." American Journal of Physiology-Gastrointestinal and Liver Physiology 287, no. 1 (2004): G125—G133. http://dx.doi.org/10.1152/ajpgi.00332.2003.

Full text
Abstract:
The Na+/H+ exchanger isoform NHE2 is highly expressed in the intestinal tract, but its physiological role has remained obscure. The aim of this study was to define its expression, location, and regulatory properties in murine colon and to look for the compensatory changes in NHE2 (−/−) colon that allow normal histology and absorptive function. To this end, we measured murine proximal colonic surface and crypt cell NHE1, NHE2, and NHE3 expression levels, transport rates in response to acid, hyperosmolarity and cAMP in murine proximal colonic crypts, as well as changes in transcript levels and acid-activated NHE activity in NHE2 (−/−) crypts. We found that NHE2 was expressed most abundantly in crypts, NHE1 equally in crypts and surface cells, and NHE3 much stronger in surface cells. NHE2, like NHE1, was activated by low intracellular pH (pHi), hyperosmolarity, and cAMP, whereas NHE3 was activated only by low pHi. Crypts isolated from NHE2 (−/−) mice displayed increased acid-activated NHE1- and NHE3-attributable Na+/H+ exchange activity, no change in NHE1 expression, and NHE3 expression levels twice as high as in normal littermates. No change in cellular ultrastructure was found in NHE2 (−/−) colon. Our results demonstrate high NHE2 expression in the crypts and suggest a role for NHE2 in cryptal pHi and volume homeostasis.
APA, Harvard, Vancouver, ISO, and other styles
5

Baker, Ann-Marie, Calum Gabbutt, Marc J. Williams, et al. "Crypt fusion as a homeostatic mechanism in the human colon." Gut 68, no. 11 (2019): 1986–93. http://dx.doi.org/10.1136/gutjnl-2018-317540.

Full text
Abstract:
ObjectiveThe crypt population in the human intestine is dynamic: crypts can divide to produce two new daughter crypts through a process termed crypt fission, but whether this is balanced by a second process to remove crypts, as recently shown in mouse models, is uncertain. We examined whether crypt fusion (the process of two neighbouring crypts fusing into a single daughter crypt) occurs in the human colon.DesignWe used somatic alterations in the gene cytochrome c oxidase (CCO) as lineage tracing markers to assess the clonality of bifurcating colon crypts (n=309 bifurcating crypts from 13 patients). Mathematical modelling was used to determine whether the existence of crypt fusion can explain the experimental data, and how the process of fusion influences the rate of crypt fission.ResultsIn 55% (21/38) of bifurcating crypts in which clonality could be assessed, we observed perfect segregation of clonal lineages to the respective crypt arms. Mathematical modelling showed that this frequency of perfect segregation could not be explained by fission alone (p<10−20). With the rates of fission and fusion taken to be approximately equal, we then used the distribution of CCO-deficient patch size to estimate the rate of crypt fission, finding a value of around 0.011 divisions/crypt/year.ConclusionsWe have provided the evidence that human colonic crypts undergo fusion, a potential homeostatic process to regulate total crypt number. The existence of crypt fusion in the human colon adds a new facet to our understanding of the highly dynamic and plastic phenotype of the colonic epithelium.
APA, Harvard, Vancouver, ISO, and other styles
6

Li, Y. Q., S. A. Roberts, U. Paulus, M. Loeffler, and C. S. Potten. "The crypt cycle in mouse small intestinal epithelium." Journal of Cell Science 107, no. 12 (1994): 3271–79. http://dx.doi.org/10.1242/jcs.107.12.3271.

Full text
Abstract:
We have used a mutation-induced marker system in the intestine of mice heterozygous at the Dlb-1 locus, which determines the expression of binding sites for the lectin Dolichos biflorus agglutinin, and the frequency of clustering of mutated crypts with time as a means of investigating the frequency of the crypt fission process and the crypt cycle. Whole-mount preparations from heterozygous Dlb-1b/Dlb-1a mice were stained with a peroxidase conjugate of Dolichos biflorus agglutinin. Mutations at the Dlb-1b locus in crypt stem cells result in loss of DBA-Px binding in these cells and subsequently their progeny, which eventually results in a rare isolated single, unstained crypt. The subsequent development of pairs, triplets and clusters of negative staining crypts has been assumed to be the result of crypt fission. The frequency of these fission events has been measured in control untreated mice. These negative crypts are the result of spontaneous mutations. We have also looked at mutated crypts after treatment with N-nitroso-N-ethylurea or N-methyl-N'-nitro-N-nitrosoguanidine of young adult mice, which elevates the number of mutations. Our results suggest that the crypt cycle in control animals is very long, 187 +/- 44 weeks (3.6 years, i.e. essentially the life of a laboratory mouse). This implies that about a third of the crypts may divide once in the life of a mouse. After sufficient time for conversion of mixed crypts to monophenotypic crypts after mutagen treatment several clusters of negative crypts were seen.(ABSTRACT TRUNCATED AT 250 WORDS)
APA, Harvard, Vancouver, ISO, and other styles
7

Zaborin, Alexander, Monika Krezalek, Sanjiv Hyoju, et al. "Critical role of microbiota within cecal crypts on the regenerative capacity of the intestinal epithelium following surgical stress." American Journal of Physiology-Gastrointestinal and Liver Physiology 312, no. 2 (2017): G112—G122. http://dx.doi.org/10.1152/ajpgi.00294.2016.

Full text
Abstract:
Cecal crypts represent a unique niche that are normally occupied by the commensal microbiota. Due to their density and close proximity to stem cells, microbiota within cecal crypts may modulate epithelial regeneration. Here we demonstrate that surgical stress, a process that invariably involves a short period of starvation, antibiotic exposure, and tissue injury, results in cecal crypt evacuation of their microbiota. Crypts devoid of their microbiota display pathophysiological features characterized by abnormal stem cell activation as judged by leucine-rich repeat-containing G protein-coupled receptor 5 (Lgr5) staining, expansion of the proliferative zone toward the tips of the crypts, and an increase in apoptosis. In addition, crypts devoid of their microbiota display loss of their regenerative capacity as assessed by their ability to form organoids ex vivo. When a four-member human pathogen community isolated from the stool of a critically ill patient is introduced into the cecum of mice with empty crypts, crypts become occupied by the pathogens and further disruption of crypt homeostasis is observed. Fecal microbiota transplantation restores the cecal crypts’ microbiota, normalizes homeostasis within crypts, and reestablishes crypt regenerative capacity. Taken together, these findings define an emerging role for the microbiota within cecal crypts to maintain epithelial cell homeostasis in a manner that may enhance recovery in response to the physiological stress imposed by the process of surgery. NEW & NOTEWORTHY This study provides novel insight into the process by which surgical injury places the intestinal epithelium at risk for colonization by pathogenic microbes and impairment of its regenerative capacity via loss of its microbiota. We show that fecal transplant restores crypt homeostasis in association with repopulation of the microbiota within cecal crypts.
APA, Harvard, Vancouver, ISO, and other styles
8

Schmidt, G. H., D. J. Winton, and B. A. Ponder. "Development of the pattern of cell renewal in the crypt-villus unit of chimaeric mouse small intestine." Development 103, no. 4 (1988): 785–90. http://dx.doi.org/10.1242/dev.103.4.785.

Full text
Abstract:
We have previously shown that the epithelium of each adult intestinal crypt in chimaeric mice is derived from a single progenitor cell. Whether the crypts are monoclonal from the outset-that is, are formed by the proliferation of a single cell-or whether their formation is initiated by several cells was not known. Here we report that many crypts contain cells of both chimaeric genotypes in the neonatal period indicating a polyclonal origin at this stage of morphogenesis. The cellular organization of the early neonatal crypt is therefore different from that of the adult crypt, which includes a zone of ‘anchored’ stem cells above the crypt base. Within 2 weeks, however, the crypt progenitor cell and its descendants displace all other cells from the crypt and the crypt attains monoclonality. The distribution of enterocytes on chimaeric villi in the neonate shows a mottled pattern of mosaicism which is progressively replaced by coherent sheets of cells from the crypts, and within two weeks the orderly adult clonal pattern is established.
APA, Harvard, Vancouver, ISO, and other styles
9

Merritt, A. J., C. S. Potten, A. J. Watson, et al. "Differential expression of bcl-2 in intestinal epithelia. Correlation with attenuation of apoptosis in colonic crypts and the incidence of colonic neoplasia." Journal of Cell Science 108, no. 6 (1995): 2261–71. http://dx.doi.org/10.1242/jcs.108.6.2261.

Full text
Abstract:
The cell-positional incidence of both spontaneous and damage-induced apoptosis of epithelial cells was assessed in longitudinal sections of the crypts of small intestine and colon of BDF1 mice. This was compared, using immunohistochemistry, with the pattern of expression of bcl-2, a suppressor of apoptosis. In the small intestine, apoptosis was maximal around cell position 4 from the base of the crypt; this closely corresponds to the position considered to contain the stem cells. In the colon, however, apoptosis was not confined to the area considered to harbour the stem cells (position 1 and 2). Instead, apoptosis was attenuated and distributed along the length of the crypt. Some cells at the base of murine colonic crypts expressed bcl-2 protein, whereas bcl-2 was absent in the crypts of the small intestine. Most pertinently, bcl-2 was absent from small intestinal crypt cells at positions 4–5 (the stem cell region). The importance of the expression of bcl-2 to the attenuation of apoptosis in stem cells was confirmed by analysis of the levels of both spontaneous and induced apoptosis in homozygously bcl-2 null C57BL/6 mice: in colonic crypts the level of spontaneous apoptosis rose significantly, and selectively at the base of the crypt, in comparison with crypts from wild-type animals. In contrast, there was no rise in spontaneous apoptosis in the small intestinal crypts from the bcl-2 null animals. Analysis of sections of human colon and small intestine also showed that expression of bcl-2 was confined to the base of the colonic crypt. The attenuation of apoptosis by bcl-2 in the region of the stem cells of the colonic crypts may dispose these to neoplastic transformation. Indeed, analysis of human carcinomas revealed expression of bcl-2, which in some samples was reciprocal with the expression of p53.
APA, Harvard, Vancouver, ISO, and other styles
10

Muncan, Vanesa, Owen J. Sansom, Leon Tertoolen, et al. "Rapid Loss of Intestinal Crypts upon Conditional Deletion of the Wnt/Tcf-4 Target Gene c-Myc." Molecular and Cellular Biology 26, no. 22 (2006): 8418–26. http://dx.doi.org/10.1128/mcb.00821-06.

Full text
Abstract:
ABSTRACT Inhibition of the mutationally activated Wnt cascade in colorectal cancer cell lines induces a rapid G1 arrest and subsequent differentiation. This arrest can be overcome by maintaining expression of a single Tcf4 target gene, the proto-oncogene c-Myc. Since colorectal cancer cells share many molecular characteristics with proliferative crypt progenitors, we have assessed the physiological role of c-Myc in adult crypts by conditional gene deletion. c-Myc-deficient crypts are lost within weeks and replaced by c-Myc-proficient crypts through a fission process of crypts that have escaped gene deletion. Although c-Myc − / − crypt cells remain in the cell cycle, they are on average much smaller than wild-type cells, cycle slower, and divide at a smaller cell size. c-Myc appears essential for crypt progenitor cells to provide the necessary biosynthetic capacity to successfully progress through the cell cycle.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Crypter"

1

Palm, Patrik. "Utvärdering av antivirusskydd mot genererade trojaner : Är de ett hot?" Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-46848.

Full text
Abstract:
I denna uppsats avser författaren att utvärdera om det är möjligt för en hemanvändare attskapa en trojan med ett program som genererar trojaner och med hjälp av andra gratisverktyg ta sig förbi antivirus-program. Samtidigt så kommer antivirus-program utvärderas angående hur dem lyckas skydda sig mot de skapade trojanerna och ge en överblick om hur skyddet är, både via uppladdning av trojaner till VirusTotal samt test av olika antivirusprogram. Den vetenskaplig forskning som gjorts tidigare som denna uppsats kommer vara snarlikgår att finna i [5]. Det forskas även om nya idéer för att upptäcka trojaner redan när dembörjar kommunicera[4] Uppsatsens resultat består av tre delar, resultat av uppladdning av trojaner viaVirusTotal, resultat av skanning med antivirus-program samt en kort analys omresultaten. I resultatet om VirusTotal så får en överblick om hur antivirus-programupptäcker Remote Access Trojaner(RAT) som blivit genererade i ett program.Dessa RATs görs även mer svårupptäckta av verktyg som går att få tag i gratis, cryptersför att kryptera trojanerna och binders för att binda trojaner ihop med en annan fil. Efterantivirus-skanningen redovisas resultat om hur ett antal utvalda antivirus-program klararav att skydda en PC mot RATs. I resultaten upptäcktes det att säkerheten är i vissa fallganska undermålig, men att det även finns antivirus-program som skyddar betydligtbättre än andra.
APA, Harvard, Vancouver, ISO, and other styles
2

Galway, Carol. "Wilhelm Busch, cryptic enigma." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2001. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/NQ60537.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lévy, Pascal. "Télécommunications cryptées par chaos." Besançon, 2004. http://www.theses.fr/2004BESA2048.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Patrick, Ardhe, and Sebastian Karlsson. "The crypto catalyst." Thesis, Linnéuniversitetet, Institutionen för marknadsföring (MF), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-75548.

Full text
Abstract:
In a scope where continuous innovations are seen each day, the cyberspace can be seen as the tech-entrepreneurs’ playground for delivering new solutions to customers. Digital start-ups who interact through the cyberspace operate with little to no restriction despite having limiting resource. In 2008 a man named Satoshi Nakamoto developed a new technology called blockchain. The new breed of firms providing blockchain solutions have been painted to live in a borderless world with little technical restrictions. Exploring the effects that blockchain brings to their internationalisation has brought our attention to study the early internationalisation of blockchain born globals and their business ecosystem. The deductive and qualitative approach gave the results from four different companies that were involved in blockchain technology. By using previous theory on internationalisation and a deductive approach a conceptual synthesis was developed. The synthesis was later applied in the case-companies to observe the results. The findings have shown that the firms implementing blockchain in the core offering has resulted in an accelerated internationalisation. The major factors contributing to this quick internationalisations is the spread of knowledge between buyers and sellers, trough the cyberspace. However, the authors were unable to find a relationship between the accelerated internationalisation and to the extent in which a firm has implemented blockchain in its core offering. The finding has given the authors prominent answers to the research question and has highlighted the complexity of the subject. The, authors conclude the thesis by displaying the importance of cyberspace in the business ecosystem; how it attracts customers and the importance of the company’s business model. Blockchain technology proved to have effects on the process of internationalisation due to superior technological performance, but also its hype.
APA, Harvard, Vancouver, ISO, and other styles
5

Ratté, Simon-Pierre. "Du neuf sur la cryptie?" Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp03/MQ55604.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Farajallah, Mousa. "Chaos-based crypto and joint crypto-compression systems for images and videos." Nantes, 2015. http://archive.bu.univ-nantes.fr/pollux/show.action?id=3c98f067-1a81-4690-9ac6-a515090c482e.

Full text
Abstract:
La sécurité des données images et vidéos est importante pour beaucoup d’applications qui exigent du temps réel et un haut niveau de sécurité. Dans la première partie de ce travail, quatre cryptosystèmes basés chaos flexibles, efficaces et très robustes contre la cryptanalyse sont conçus et réalisés. Les deux premiers s’appuient sur le réseau SPN. La substitution est réalisée par une carte Skew tent (FSTM) modifiée pour surmonter différents problèmes : point fixe, restriction de la taille de la clé et limitation de la cartographie entre les textes d’origines et chiffrés. Le troisième cryptosystème est de structure nouvelle et également efficace. Il est basé sur une couche de diffusion binaire de pixels, suivi par une couche de permutation des bits. La permutation est réalisée par une nouvelle formulation efficace de la carte 2-D Cat. Le quatrième cryptosystème, est plus rapide que les autres avec un niveau de sécurité très élevé. Sa conception s’appuie sur une cryptanalyse partielle, que nous avons réalisée, de l’algorithme de Zhang. Dans la deuxième partie, deux crypto-compression basés chaos sélectifs et rapides sont utilisés pour sécuriser le flux HEVC et SHVC. Dans le premier crypto-compression, un nouvel algorithme pour définir les bits chiffrables dans le flux binaire du HEVC et du SHVC est proposé. La solution proposée chiffre un ensemble de paramètres SHVC sensibles au niveau du codeur entropique (CABAC), tout en préservant l’ensemble des fonctionnalités SHVC. Basé sur le concept de tuile, le deuxième crypto-compression proposé permet une protection de la vidéo au niveau d’une Région d’Intérêt (ROI) définie dans le standard HEVC<br>The security of image and video data is important for many applications which require in real-time a high security level. In the first part of this work, four chaos-based cryptosystems, flexible, efficient, and more robust against cryptanalysis, are designed and realized. The first two cryptosystems are based on the substitution-permutation network. The substitution is achieved by a proposed modified Finite Skew Tent Map (FSTM) to overcome various problems: fixed point, key space restriction, and limitation of mapping between plaintext and ciphertext. The third cryptosystem is a new and efficient structure. It is based on a binary diffusion layer of pixels, followed by a bit-permutation layer. The permutation is achieved by an efficient proposed formulation of the 2-D cat map. The fourth cryptosystem is faster than the others, having a very high security level. The confusion and the diffusion are performed in a single scan. Its design is based on a partial cryptanalysis that we performed on the Zhang algorithm. In the second part, two fast and secure selective chaos-based crypto-compressions are designed and realized to secure the High Efficiency Video Coding (HEVC) and its scalable version. In the first crypto-compression, a new algorithm is proposed to define the encryptable bits in the bit stream of the HEVC and the SHVC systems. The proposed solution encrypts a set of sensitive SHVC parameters at the entropy encoder (CABAC), while preserving all SHVC functionalities. Based on the tile concept, the second proposed crypto-compression provides protection of the ROI defined in the standard HEVC
APA, Harvard, Vancouver, ISO, and other styles
7

MELLO, CLAUDIO GOMES DE. "CRYPTO-COMPRESSION PREFIX CODING." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2006. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=9932@1.

Full text
Abstract:
Cifragem e compressão de dados são funcionalidades essencias quando dados digitais são armazenados ou transmitidos através de canais inseguros. Geralmente, duas operações sequencias são aplicadas: primeiro, compressão de dados para economizar espaço de armazenamento e reduzir custos de transmissão, segundo, cifragem de dados para prover confidencialidade. Essa solução funciona bem para a maioria das aplicações, mas é necessário executar duas operações caras, e para acessar os dados, é necessário primeiro decifrar e depois descomprimir todo o texto cifrado para recuperar a informação. Neste trabalho são propostos algoritmos que realizam tanto compressão como cifragem de dados. A primeira contribuição desta tese é o algoritmo ADDNULLS - Inserção Seletiva de Nulos. Este algoritmo usa a técnica da esteganografia para esconder os símbolos codificados em símbolos falsos. É baseado na inserção seletiva de um número variável de símbolos nulos após os símbolos codificados. É mostrado que as perdas nas taxas de compressão são relativamente pequenas. A segunda contribuição desta tese é o algoritmo HHC - Huffman Homofônico-Canônico. Este algoritmo cria uma nova árvore homofônica baseada na árvore de Huffman canônica original para o texto de entrada. Os resultados dos experimentos são mostrados. A terceira contribuição desta tese é o algoritmo RHUFF - Huffman Randomizado. Este algoritmo é uma variante do algoritmo de Huffman que define um procedimento de cripto-compressão que aleatoriza a saída. O objetivo é gerar textos cifrados aleatórios como saída para obscurecer as redundâncias do texto original (confusão). O algoritmo possui uma função de permutação inicial, que dissipa a redundância do texto original pelo texto cifrado (difusão). A quarta contribuição desta tese é o algoritmo HSPC2 - Códigos de Prefixo baseados em Substituição Homofônica com 2 homofônicos. No processo de codificação, o algoritmo adiciona um bit de sufixo em alguns códigos. Uma chave secreta e uma taxa de homofônicos são parâmetros que controlam essa inserção. É mostrado que a quebra do HSPC2 é um problema NP- Completo.<br>Data compression and encryption are essential features when digital data is stored or transmitted over insecure channels. Usually, we apply two sequential operations: first, we apply data compression to save disk space and to reduce transmission costs, and second, data encryption to provide confidentiality. This solution works fine for most applications, but we have to execute two expensive operations, and if we want to access data, we must first decipher and then decompress the ciphertext to restore information. In this work we propose algorithms that achieve both compressed and encrypted data. The first contribution of this thesis is the algorithm ADDNULLS - Selective Addition of Nulls. This algorithm uses steganographic technique to hide the real symbols of the encoded text within fake ones. It is based on selective insertion of a variable number of null symbols after the real ones. It is shown that coding and decoding rates loss are small. The disadvantage is ciphertext expansion. The second contribution of this thesis is the algorithm HHC - Homophonic- Canonic Huffman. This algorithm creates a new homophonic tree based upon the original canonical Huffman tree for the input text. It is shown the results of the experiments. Adding security has not significantly decreased performance. The third contribution of this thesis is the algorithm RHUFF - Randomized Huffman. This algorithm is a variant of Huffman codes that defines a crypto-compression algorithm that randomizes output. The goal is to generate random ciphertexts as output to obscure the redundancies in the plaintext (confusion). The algorithm uses homophonic substitution, canonical Huffman codes and a secret key for ciphering. The secret key is based on an initial permutation function, which dissipates the redundancy of the plaintext over the ciphertext (diffusion). The fourth contribution of this thesis is the algorithm HSPC2 - Homophonic Substitution Prefix Codes with 2 homophones. It is proposed a provably secure algorithm by using a homophonic substitution algorithm and a key. In the encoding process, the HSPC2 function appends a one bit suffx to some codes. A secret key and a homophonic rate parameters control this appending. It is shown that breaking HSPC2 is an NP-Complete problem.
APA, Harvard, Vancouver, ISO, and other styles
8

Lo, Gerfo Luisa Maria. "Cryptes, chambres de momification et procédés de conservation des corps(siècles XVIII-XIX) dans le contexte archéologiques et paléopathologique de la Sicile." Thesis, Aix-Marseille, 2013. http://www.theses.fr/2013AIXM5026.

Full text
Abstract:
Devant les processus de décomposition, les sociétés humaines réagissent en pratiquant interventions culturelles de 'thanato-métamorphose' sur les cadavres, comme la momification. En Sicile nous trouvons une pratique de momification toute originelle (XVIe ÷ XIXe siècles), pratiquée par les moines des congrégations religieuses, qui se développe selon une série de variations locales. Elle est le fruit d’une longue et non définitive expérimentation, consistant dans une méthode empirique de dessiccation des dépouilles mortelles. Le procédé de conservation se déroulait dans les chambres souterraines annexées aux églises, pourvues des égouttoirs. La momification reflétait des fonctions et idéologies précises, vivement lié aux possibilités économiques des individus, nécessaires pour maintenir le status économique et social d’appartenance. La lente disparition de la pratique de momification des corps remonte au l’édit de Saint-Cloud du 1804, qui marque l’interdiction législative d’inhumation des cadavres dans les églises et l’apparition des premiers cimetières extra moenia. Cependant, beaucoup d'éléments de la séculaire pratique de la momification survécurent. Les données recueillies nous poussent à penser que la momification fût une pratique bien enracinée dans le monde sicilien, et qu’après et malgré les décrets législatifs du 1804, elle ait 'survécu', en influençant l'enterrement et la relation avec la Mort jusqu'à nos jours<br>Having to do with the processes of decomposition, the human societies react by practicing cultural interventions of 'thanato-metamorphosis' on bodies, as the mummification. In Sicily we find a practice of mummification really original (XVI th ÷ XIX th centuries), practiced by the monks of the religious congregations, which develops according to a series of local variations. This practice is the fruit of long and not definitive experimentation, consisting in an empirical method of dehydration of human remains. The process of conservation of bodies took place in the subterranean rooms annexed to churches, provided with colanders. The mummification reflected particulars functions and ideologies, deeply tied to the economic possibilities of the individuals, necessaries to maintain the economic and social status of belonging. The slow disappearance of the mummification’s practice goes up to the edict of Saint-Cloud of the 1804, which marks the legislative interdiction of burial’s bodies in churches and the appearance of first cemeteries extra moenia. However, many elements of secular practice of mummification have survived. By the informations gathered on mummification’s practice we think that the practice was well rooted in the sicilian world, after the legislative decree of the 1804, and that it has survived, by influencing to bury and the relation with the Death until our days
APA, Harvard, Vancouver, ISO, and other styles
9

Totolici, Alexandru. "CRYPSTOR : a platform for secure storage." Thesis, University of British Columbia, 2013. http://hdl.handle.net/2429/44603.

Full text
Abstract:
Cloud computing continues to grow as a preferred development and deployment model, enabling new types of applications to be built while keeping resource requirements convenient for developers. Sacrifices have been made, however, in terms of the security and protection of data stored in these cloud applications, leaving users vulnerable to information leaks and invasions of privacy. We present CRYPSTOR, a storage platform design that addresses data security in the cloud computing context through the use of encryption, while maintaining the desirable properties of the current model, such as efficient storage and sharing.
APA, Harvard, Vancouver, ISO, and other styles
10

Heffelfinger, Blair. "The adherence of Acidiphilium cryptum to chalcopyrite." Thesis, University of British Columbia, 1990. http://hdl.handle.net/2429/28792.

Full text
Abstract:
Acidiphilium cryptum is a heterotrophic acidophile commonly found in acidic environments and industrial bioleaching operations. Attachment to mineral surfaces may serve to maintain this organism in aqueous environments where it is subject to removal by hydrodynamic forces. Using indirect and direct methods we have looked at the binding of A.cryptum to chalcopyrite (CuFeS₂) and other mineral ores to determine whether specific adhesins mediate binding. A modified ELISA binding assay (the Ore ELISA) was developed to measure direct adherence. Finely ground chalcopyrite was bound irreversibly to the walls of an ELISA plate, the organisms were added and after incubation and washing, the number of attached bacteria were assessed by reacting with anti-A.cryptum antibody followed by goat anti-rabbit IgG conjugated to alkaline phosphatase. This assay was found to be sensitive, rapid and reproducible. The Ore ELISA allowed direct binding measurement in the presence of various inhibitors and provided a rapid screening method for adherence-defective mutants. Adherence was shown to be saturable and increased slightly as pH decreased. A moderate increase in binding affinity was recorded in the presence of monovalent and divalent cations and EDTA. Various bactericidal agents and pentose and hexose sugars had no effect on chalcopyrite attachment. Reducing agents had little effect on cell adherence. A strong increase in adherence was observed in the presence of surface active agents. Bovine serum albumin and gelatin were both found to markedly reduce mineral surface binding. Competition for attachment sites between A.cryptum and the autotrophic acidophile, Thiobacillus ferrooxidans, showed that each organism binds to unique sites on the chalcopyrite surface. A.cryptum mutant strains displaying reduced adherence to chalcopyrite were shown to lack a 31.6 kDa outer membrane protein.<br>Science, Faculty of<br>Microbiology and Immunology, Department of<br>Graduate
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Crypter"

1

Larcher, Éric. L' Internet sécurisé: Comment crypter ses mails, lutter contre le spam et les virus, protéger son anonymat sur le Web. Eyrolles, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Paris souterrain: Carrières, catacombes, cryptes, égouts, tunnels = Beneath Paris : quarries, catacombs, crypts, sewers, tunnels. Parigramme, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Yano, Makoto. Blockchain and Crypto Currency: Building a High Quality Marketplace for Crypt Data. Springer Nature, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Desbordes, Jean-Michel. Limoges, crypte Saint-Martial. Impr. nationale, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Klinke, Ian. Cryptic Concrete. John Wiley & Sons, Ltd, 2018. http://dx.doi.org/10.1002/9781119261155.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Faire part: Cryptes de Derrida. Lignes, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

La crypte des templiers: Roman. Pygmalion, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Cryptic Campaigns (Tales From the Crypt). West End Games, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Iyer, Tara. Cryptic Connections: Spillovers Between Crypto and Equity Markets. International Monetary Fund, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Iyer, Tara. Cryptic Connections: Spillovers Between Crypto and Equity Markets. International Monetary Fund, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Crypter"

1

Kahan, Jeffrey. "Crypts and Crypto-Graphology." In Shakespiritualism. Palgrave Macmillan US, 2013. http://dx.doi.org/10.1057/9781137313553_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Swammy, Sarah, Richard Thompson, and Marvin Loh. "Tales from the Crypt: The Dawn of Crypto Currency." In Crypto Uncovered. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00135-3_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Gross, Isabelle. "Crypts." In Encyclopedia of Cancer. Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-642-27841-9_7184-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gross, Isabelle. "Crypts." In Encyclopedia of Cancer. Springer Berlin Heidelberg, 2016. http://dx.doi.org/10.1007/978-3-662-46875-3_7184.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Taulli, Tom. "Crypto." In The Personal Finance Guide for Tech Professionals. Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-8242-7_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Anderson, Patrick D. "Crypto!" In Cypherpunk Ethics. Routledge, 2022. http://dx.doi.org/10.4324/9781003220534-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hargitai, Henrik. "Cryptic Region." In Encyclopedia of Planetary Landforms. Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4614-9213-9_93-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Gullotta, F. "Cryptic Gliomas." In Minimal Neoplasia. Springer Berlin Heidelberg, 1988. http://dx.doi.org/10.1007/978-3-642-83245-1_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

White, Thomas E. "Cryptic Coloration." In Encyclopedia of Animal Cognition and Behavior. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-47829-6_665-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hargitai, Henrik. "Cryptic Region." In Encyclopedia of Planetary Landforms. Springer New York, 2015. http://dx.doi.org/10.1007/978-1-4614-3134-3_93.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Crypter"

1

Ali, Yousif, and Abdul Hameed. "Cloud Crypter for bypassing Antivirus." In 2019 15th International Conference on Emerging Technologies (ICET). IEEE, 2019. http://dx.doi.org/10.1109/icet48972.2019.8994615.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Barria, Cristian, David Cordero, Claudio Cubillos, and Robinson Osses. "Obfuscation procedure based in dead code insertion into crypter." In 2016 6th International Conference on Computers Communications and Control (ICCCC). IEEE, 2016. http://dx.doi.org/10.1109/icccc.2016.7496733.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Huidobro, Cristian Barria, David Cordero, Claudio Cubillos, Hector Allende Cid, and Claudio Casado Barragan. "Obfuscation procedure based on the insertion of the dead code in the crypter by binary search." In 2018 7th International Conference on Computers Communications and Control (ICCCC). IEEE, 2018. http://dx.doi.org/10.1109/icccc.2018.8390457.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Datta, Avishek, Rajdeep Chakraborty, and J. K. Mandal. "The CRYPSTER: A private key Crypto system." In 2015 IEEE International Conference on Computer Graphics, Vision and Information Security (CGVIS). IEEE, 2015. http://dx.doi.org/10.1109/cgvis.2015.7449882.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Федосеев, Н. Ф., and Л. Ю. Пономарев. "Settlement of early Byzantine time at the Kyz-Aul necropolis." In Древности Боспора. Crossref, 2018. http://dx.doi.org/10.25681/iaras.2018.978-5-94375-251-3.257-281.

Full text
Abstract:
Necropolis Kyz-Aul is located on the Black Sea coast, 1 km to the south-east of the village. Yakovenkovo. In 1930, 1979–1983, 1985, 1995, 1997, 2000, 2005–2006, 2015–2017, he was investigated by Yu. Martti, O. Chevelev, N. Sudarev and N. Fedoseev. Separate burials date back to the II–I BC, the burial of the I–III AD the most recent burials, apparently, were committed in the IV–V AD. In the VI – third quarter of the VII century AD on the territory of the already abandoned necropolis, a small settlement was located. Its cultural stratum is traced on all sites that have been followed in the last decade. As living quarters, the looted crypts of the 1st–3rd centuries AD were adapted, consisting of one or two funerary cells and built of massive blocks of limestone (№ 6, 7, 9, 10). With exception of the crypts of the poorly preserved pit of the semidugout (?) other residential and household buildings on the necropolis could not be fixed. One child burial also belongs to the same period. The most well-preserved living room in the crypt number 6. In one of its funerary cells housed five household pits and heating devices, including a fireplace, reminiscent of the design of the fireplace. In the other crypts, the interior details of the “underground” dwellings have not been preserved. In the “Khazar” time burial chamber crypts were adapted for the maintenance of small cattle. The time of the early Byzantine settlement on the necropolis dates numerous finds of amphorae. The upper date was determined thanks to the coin of 674 Constantine IV Pogonat. In addition, a ring with the image of an archangel was found, an analogy of which is known in the burial complexes of the 7th century. Unfortunately, the area and location of the necropolis of this settlement is not yet established. Cannot be reconstructed and its layout. It is difficult to reconstruct the interior of the “underground” dwellings themselves, since the crypts were reused in the “Khazar” period. In addition, no other settlements of this time were found on the ancient necropolises of the Kerch Peninsula
APA, Harvard, Vancouver, ISO, and other styles
6

Popa, Raluca Ada, Catherine M. S. Redfield, Nickolai Zeldovich, and Hari Balakrishnan. "CryptDB." In the Twenty-Third ACM Symposium. ACM Press, 2011. http://dx.doi.org/10.1145/2043556.2043566.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lewis, Jeff. "Cryptol." In the 2007 ACM workshop. ACM Press, 2007. http://dx.doi.org/10.1145/1314436.1314442.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Chen, You-Ping, and Ju-Chun Ko. "CryptoAR Wallet." In MobileHCI '19: 21st International Conference on Human-Computer Interaction with Mobile Devices and Services. ACM, 2019. http://dx.doi.org/10.1145/3338286.3344386.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Roy Chowdhury, Amrita, Chenghong Wang, Xi He, Ashwin Machanavajjhala та Somesh Jha. "Cryptϵ". У SIGMOD/PODS '20: International Conference on Management of Data. ACM, 2020. http://dx.doi.org/10.1145/3318464.3380596.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Cha, ByungRae. "CRYPTEX Model for Software Source Code." In 2008 International Conference on Information Security and Assurance ISA. IEEE, 2008. http://dx.doi.org/10.1109/isa.2008.74.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Crypter"

1

Cong, Lin William, Xi Li, Ke Tang, and Yang Yang. Crypto Wash Trading. National Bureau of Economic Research, 2022. http://dx.doi.org/10.3386/w30783.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Fiorentino, D., U. Gräwe, J. Holstein, J. Dannheim, K H Wiltshire, and T. Brey. Cryptic or simply neglected diversity? Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 2017. http://dx.doi.org/10.4095/305850.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Megonigal, Patrick, and Scott Pitz. Cryptic Methane Emissions from Upland Forest Ecosystems. Office of Scientific and Technical Information (OSTI), 2016. http://dx.doi.org/10.2172/1248029.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Deane, Stephen, and Olivier Fines. Cryptoassets: Beyond the Hype. CFA Institute, 2023. http://dx.doi.org/10.56227/23.1.1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Smyslov, V. Simple Cryptographic Program Interface (Crypto API). RFC Editor, 1999. http://dx.doi.org/10.17487/rfc2628.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Cong, Lin William, Campbell Harvey, Daniel Rabetti, and Zong-Yu Wu. An Anatomy of Crypto-Enabled Cybercrimes. National Bureau of Economic Research, 2023. http://dx.doi.org/10.3386/w30834.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

raterman, clay. Decentralized ETFs &amp; Hedge Funds In Crypto. ResearchHub Technologies, Inc., 2022. http://dx.doi.org/10.55277/researchhub.nv9y7pc4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Soloviev, Vladimir, Victoria Solovieva, Anna Tuliakova, Alexey Hostryk, and Lukáš Pichl. Complex networks theory and precursors of financial crashes. [б. в.], 2020. http://dx.doi.org/10.31812/123456789/4119.

Full text
Abstract:
Based on the network paradigm of complexity in the work, a systematic analysis of the dynamics of the largest stock markets in the world and cryptocurrency market has been carried out. According to the algorithms of the visibility graph and recurrence plot, the daily values of stock and crypto indices are converted into a networks and multiplex networks, the spectral and topological properties of which are sensitive to the critical and crisis phenomena of the studied complex systems. This work is the first to investigate the network properties of the crypto index CCI30 and the multiplex network of key cryptocurrencies. It is shown that some of the spectral and topological characteristics can serve as measures of the complexity of the stock and crypto market, and their specific behaviour in the pre-crisis period is used as indicators- precursors of critical phenomena.
APA, Harvard, Vancouver, ISO, and other styles
9

Catalini, Christian, and Joshua Gans. Initial Coin Offerings and the Value of Crypto Tokens. National Bureau of Economic Research, 2018. http://dx.doi.org/10.3386/w24418.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Nelson, D., ed. Crypto-Agility Requirements for Remote Authentication Dial-In User Service (RADIUS). RFC Editor, 2011. http://dx.doi.org/10.17487/rfc6421.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography