Results 61 to 70 of about 78,722 (281)
The researcher has recently been working on the authenticity of information particularly with the use of cryptographic hash functions such as MD5 and Secure Hash Algorithm (SHA).
Francis G. Balazon
doaj +1 more source
Evidence of signatures associated with cryptographic modes of operation is established. Motivated by some analogies between cryptographic and dynamical systems, in particular with chaos theory, we propose an algorithm based on Lyapunov exponents of ...
Baetens, Jan M. +4 more
core +1 more source
ABSTRACT Background The management of clinically apparent single lesions or oligofocal nephroblastomatosis, a facultative precursor of nephroblastoma, remains debated. Methods We retrospectively analyzed 37 patients with clinically apparent single or oligofocal nephroblastomatosis (two to three lesions per kidney) among 2347 patients registered between
Nils Welter +17 more
wiley +1 more source
A Wireless Sensor Network (WSN) is a collection of sensors that communicate or track a specific object. It is used in many fields of war, architecture, or espionage, but the wireless sensor network faces challenges in securing the path or the message ...
Haneen Mohammed Hussein +2 more
doaj +1 more source
Background As sequencing technology has advanced in recent years, a series of synapse-related gene variants have been reported to be associated with autism spectrum disorders (ASDs).
Qianyun Cai +6 more
doaj +1 more source
The New Block Cipher Design (Tigris Cipher) [PDF]
Abstract—In the present paper we have proposed a new variant of AES cipher with high level of security and an elegant construction called TIGRIS cipher. The TIGRIS name has been derived from one of the two famous rivers in Iraq. The proposed TIGRIS cipher is a revision for the proposed Euphrates cipher which has already been published.
Omar A. Dawood +2 more
openaire +1 more source
Inpatient Food Insecurity and Pediatric Hematology Oncology Hospitalization Outcomes
ABSTRACT Children with cancer and blood disorders are at risk for food insecurity (FI). We aimed to describe the association of inpatient food insecurity (IFI) and hospitalization outcomes among patients admitted to the pediatric hematology oncology service. Of 325 caregivers screened for IFI, 60 (18.6%) screened positive.
Joanna M. Robles +4 more
wiley +1 more source
There is an emerging literature describing the use of knowledge translation strategies to increase the relevance and usability of research, yet there are few real-world examples of how this works in practice. This case study reports on the steps taken to
Gabriel Moore +5 more
doaj
On construction of perfect ciphers
K. Shannon in the 40s of the 20th century introduced the concept of a perfect cipher, which provides the best protection of plaintexts. Perfect secrecy means that cryptanalyst can obtain no information about the plaintext by observing the ciphertext.
Sergey M Ratseev
doaj +1 more source
The Engima Cipher Machine [PDF]
There can be little doubt that the German “Enigma” was the best and safest mechanical cipher machine available in any country at the outbreak of the Second World War.
Wilson, Tony
core +1 more source

