PUF‐based encryption method for IC cards on‐chip memories

2016 ◽  
Vol 52 (20) ◽  
pp. 1671-1673 ◽  
Author(s):  
Yonghong Bai ◽  
Liji Wu ◽  
Xingjun Wu ◽  
Xiangyu Li ◽  
Xiangmin Zhang ◽  
...  
Keyword(s):  
On Chip ◽  
2020 ◽  
Vol 477 (14) ◽  
pp. 2679-2696
Author(s):  
Riddhi Trivedi ◽  
Kalyani Barve

The intestinal microbial flora has risen to be one of the important etiological factors in the development of diseases like colorectal cancer, obesity, diabetes, inflammatory bowel disease, anxiety and Parkinson's. The emergence of the association between bacterial flora and lungs led to the discovery of the gut–lung axis. Dysbiosis of several species of colonic bacteria such as Firmicutes and Bacteroidetes and transfer of these bacteria from gut to lungs via lymphatic and systemic circulation are associated with several respiratory diseases such as lung cancer, asthma, tuberculosis, cystic fibrosis, etc. Current therapies for dysbiosis include use of probiotics, prebiotics and synbiotics to restore the balance between various species of beneficial bacteria. Various approaches like nanotechnology and microencapsulation have been explored to increase the permeability and viability of probiotics in the body. The need of the day is comprehensive study of mechanisms behind dysbiosis, translocation of microbiota from gut to lung through various channels and new technology for evaluating treatment to correct this dysbiosis which in turn can be used to manage various respiratory diseases. Microfluidics and organ on chip model are emerging technologies that can satisfy these needs. This review gives an overview of colonic commensals in lung pathology and novel systems that help in alleviating symptoms of lung diseases. We have also hypothesized new models to help in understanding bacterial pathways involved in the gut–lung axis as well as act as a futuristic approach in finding treatment of respiratory diseases caused by dysbiosis.


2020 ◽  
Vol 3 (2) ◽  
pp. 182-186
Author(s):  
Lisnayani Silalahi ◽  
Anita Sindar

Data security and confidentiality is currently a very important issue and continues to grow. Several cases concerning data security are now a job that requires handling and security costs that are so large. To maintain the security and confidentiality of messages, data, or information so that no one can read or understand it, except for the rightful recipients, a data security system application with an encryption method using an algorithm is designed. The SHA-1 cryptographic hash function that takes input and produces a 160-bit hash value which is known as the message iteration is usually rendered as a 40-digit long hexadecimal number.


2016 ◽  
Vol 136 (6) ◽  
pp. 244-249
Author(s):  
Takahiro Watanabe ◽  
Fumihiro Sassa ◽  
Yoshitaka Yoshizumi ◽  
Hiroaki Suzuki

2012 ◽  
Vol E95.C (7) ◽  
pp. 1244-1251 ◽  
Author(s):  
Koji TAKEDA ◽  
Tomonari SATO ◽  
Takaaki KAKITSUKA ◽  
Akihiko SHINYA ◽  
Kengo NOZAKI ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document