Results 21 to 30 of about 198,891 (343)
Was there a ruler? Reflections on certain Aspects of the Career and Politics of the Triumvir M. Antony [PDF]
The article is devoted to the consideration of the nature of the policy and political goals of the triumvir M. Antony. First of all, it is noted that he came from a family that did not have any political influence, or connections, whose members
Smykov, Evgeniy Vladimirovich
doaj +1 more source
New cryptanalysis of the authenticated cipher model JAMBU
Based on the characteristic of JAMBU,a forgery attack by using the principle,where the associated data can be transformed into the plaintext was proposed.It is shown that the attack requires a data complexity of about 2n2chosen plaintext,and a time ...
Yu-dan TIAN, Yong-zhuang WEI
doaj +1 more source
LANDSCAPE METRICS RELATED TO RIO GRANDE WILD TURKEY WINTER ROOSTS IN SOUTH TEXAS
: Roost sites may be a limiting factor for Rio Grande wild turkey (Meleagris gallopavo intermedia) distribution. Because the landscape context of roost sites may influence use of these sites, it is important to understand roost‐habitat characteristics ...
Casey E. Phillips +4 more
doaj +1 more source
An amendment to this paper has been published and can be accessed via a link at the top of the paper.
F. Windler +6 more
doaj +1 more source
Animal use of fence crossings in southwestern rangelands
Net‐wire fencing built to confine livestock is common on rangelands in the Southwestern USA, yet the impacts of livestock fencing on wildlife are largely unknown.
Lisa D. Zoromski +6 more
doaj +1 more source
Background As an increasing number of deaths occur in the intensive care unit (ICU), studies have sought to describe, understand, and improve end-of-life care in this setting.
F. Boissier +33 more
semanticscholar +1 more source
Identification of buildings from remotely sensed imagery in urban and suburban areas is a challenging task. Light detection and Ranging (LiDAR) provides an opportunity to accurately identify buildings by identification of planar surfaces.
Thomas J. Yamashita +4 more
doaj +1 more source
A fundamental flaw in the ++AE authenticated encryption mode
In this article, we analyse a block cipher mode of operation for authenticated encryption known as ++AE (plus-plus-AE). We show that this mode has a fundamental flaw: the scheme does not verify the most significant bit of any block in the plaintext ...
Qahur Al Mahri Hassan +4 more
doaj +1 more source
Cryptography: A Combination of Caesar and Affine Cipher to Conceal the Message
Advances in technology make it easy for humans to communicate with each other. One of them is by sending messages. However, the confidentiality of messages can be hacked by third parties.
Septi Wulandari
semanticscholar +1 more source
Bringing back the dead: Genetic data from avian carcasses
Advances in laboratory methods and DNA sequencing technology have enabled genetic analyses of noninvasive samples, museum specimens, fossil material, and more recently, carcasses.
Lianne M. Koczur +3 more
doaj +1 more source

