Results 61 to 70 of about 335,598 (166)
Análisis de la gestión de seguridad de los protocolos WPA y WPA2 en el tráfico de datos de una red LAN con tecnología WiFi [PDF]
Este documento pretende explicar paso a paso el sistema utilizado por los protocolos de seguridad de acceso e intercambio de datos WPA Y WPA2 utilizados por el sistema de comunicaciones WiFi.
Fonseca Sánchez, Víctor Hugo +1 more
core
ABSTRACT Background Potential triggers of immune‐mediated hemolytic anemia (IMHA) are often identified, but their frequency and the benefit of extensive screening for these to individual dogs is uncertain. Objective To assess the frequency of non‐associative IMHA in dogs undergoing screening in Britain and Ireland and identify where specific tests ...
Tyler Morrison +8 more
wiley +1 more source
ABSTRACT Background Snakebite envenomation is a worldwide public health issue, particularly relevant to low and middle‐income countries. Bothrops spp. antivenom is needed for snakebite treatment, which requires the maintenance of healthy snakes in captivity.
Amanda O. Alcantara +10 more
wiley +1 more source
ЗАЩИТА ДОМАШНЕЙ WI-FI СЕТИ ОТ ВЗЛОМА [PDF]
Беспроводные сети не являются защищенными.
Манко, Е.М. +1 more
core
Wireless Voting System Based on IEEE 802.15.4/Zigbee [PDF]
Práce podrobně popisuje bezdrátový protokol IEEE 802.15.4/ZigBee a zabývá se návrhem architektury bezdrátového hlasovacího systému založené na zmíněné technologii.
Albrecht, Pavel
core
Autentificirana enkripcija [PDF]
Dva najvažnija cilja kriptografije su pružanje povjerljivosti i autentičnosti, odnosno integriteta poruka koje se šalju putem nesigurnog komunikacijskog kanala.
Biskup, Lucija
core +2 more sources
Trusted Computing using Enhanced Manycore Architectures with Cryptoprocessors
International audienceManycore architectures correspond to a main evolution of computing systems due to their high processing power. Many applications can be executed in parallel which provides users with a very efficient technology.
Baganne, A +5 more
core +1 more source
Block encryption of quantum messages [PDF]
In modern cryptography, block encryption is a fundamental cryptographic primitive. However, it is impossible for block encryption to achieve the same security as one-time pad.
Liang, Min, Yang, Li
core +1 more source
CURRENT APPROACHES IN MODERN CRYPTOLOGY [PDF]
This work proposes a brief analysis of the different types of current approaches to modern cryptology in present days. Due to increased development of communications and IT technologies, the field of cryptography practical approaches exceeded your ...
Mircea Andraşiu
core
SDNsec: Forwarding Accountability for the SDN Data Plane
SDN promises to make networks more flexible, programmable, and easier to manage. Inherent security problems in SDN today, however, pose a threat to the promised benefits. First, the network operator lacks tools to proactively ensure that policies will be
Hoefler, Torsten +4 more
core +1 more source

