Results 61 to 70 of about 335,598 (166)

Análisis de la gestión de seguridad de los protocolos WPA y WPA2 en el tráfico de datos de una red LAN con tecnología WiFi [PDF]

open access: yes, 2012
Este documento pretende explicar paso a paso el sistema utilizado por los protocolos de seguridad de acceso e intercambio de datos WPA Y WPA2 utilizados por el sistema de comunicaciones WiFi.
Fonseca Sánchez, Víctor Hugo   +1 more
core  

Multicenter, Retrospective Determination of the Clinical Utility of Screening Tests in Dogs With Immune‐Mediated Hemolytic Anemia in the United Kingdom and Ireland

open access: yesJournal of Veterinary Internal Medicine, Volume 39, Issue 5, September/October 2025.
ABSTRACT Background Potential triggers of immune‐mediated hemolytic anemia (IMHA) are often identified, but their frequency and the benefit of extensive screening for these to individual dogs is uncertain. Objective To assess the frequency of non‐associative IMHA in dogs undergoing screening in Britain and Ireland and identify where specific tests ...
Tyler Morrison   +8 more
wiley   +1 more source

Hematology, Clinical Biochemistry, and Blood Cell Morphology Features of Captive Bothrops jararaca From Southeast Brazil

open access: yesVeterinary Clinical Pathology, Volume 54, Issue 3, Page 221-229, September 2025.
ABSTRACT Background Snakebite envenomation is a worldwide public health issue, particularly relevant to low and middle‐income countries. Bothrops spp. antivenom is needed for snakebite treatment, which requires the maintenance of healthy snakes in captivity.
Amanda O. Alcantara   +10 more
wiley   +1 more source

ЗАЩИТА ДОМАШНЕЙ WI-FI СЕТИ ОТ ВЗЛОМА [PDF]

open access: yes, 2012
Беспроводные сети не являются защищенными.
Манко, Е.М.   +1 more
core  

Wireless Voting System Based on IEEE 802.15.4/Zigbee [PDF]

open access: yes, 2010
Práce podrobně popisuje bezdrátový protokol IEEE 802.15.4/ZigBee a zabývá se návrhem architektury bezdrátového hlasovacího systému založené na zmíněné technologii.
Albrecht, Pavel
core  

Autentificirana enkripcija [PDF]

open access: yes, 2018
Dva najvažnija cilja kriptografije su pružanje povjerljivosti i autentičnosti, odnosno integriteta poruka koje se šalju putem nesigurnog komunikacijskog kanala.
Biskup, Lucija
core   +2 more sources

Trusted Computing using Enhanced Manycore Architectures with Cryptoprocessors

open access: yes, 2014
International audienceManycore architectures correspond to a main evolution of computing systems due to their high processing power. Many applications can be executed in parallel which provides users with a very efficient technology.
Baganne, A   +5 more
core   +1 more source

Block encryption of quantum messages [PDF]

open access: yes, 2018
In modern cryptography, block encryption is a fundamental cryptographic primitive. However, it is impossible for block encryption to achieve the same security as one-time pad.
Liang, Min, Yang, Li
core   +1 more source

CURRENT APPROACHES IN MODERN CRYPTOLOGY [PDF]

open access: yes
This work proposes a brief analysis of the different types of current approaches to modern cryptology in present days. Due to increased development of communications and IT technologies, the field of cryptography practical approaches exceeded your ...
Mircea Andraşiu
core  

SDNsec: Forwarding Accountability for the SDN Data Plane

open access: yes, 2016
SDN promises to make networks more flexible, programmable, and easier to manage. Inherent security problems in SDN today, however, pose a threat to the promised benefits. First, the network operator lacks tools to proactively ensure that policies will be
Hoefler, Torsten   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy